Cantitate/Preț
Produs

Information Systems Security: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings: Lecture Notes in Computer Science, cartea 8880

Editat de Atul Prakash, Rudrapatna Shyamasundar
en Limba Engleză Paperback – 20 noi 2014
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32465 lei

Preț vechi: 40581 lei
-20% Nou

Puncte Express: 487

Preț estimativ în valută:
6215 6770$ 5214£

Carte tipărită la comandă

Livrare economică 19 decembrie 24 - 02 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319138404
ISBN-10: 3319138405
Pagini: 504
Ilustrații: XXIV, 478 p. 163 illus.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.7 kg
Ediția:2014
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Security inferences.- Security policies.- Security user interfaces.- Security attacks.- Malware detection.- Forensics.- Location based security services.

Textul de pe ultima copertă

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.