CHF 69.00

Information Security Theory and Practice
10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

Inglese · Tascabile

Spedizione di solito entro 4 a 7 giorni lavorativi

Descrizione

Ulteriori informazioni

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.
WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Dettagli sul prodotto

Con la collaborazione di Javier Lopez (Editore), Sara Foresti (Editore)
Editore Springer, Berlin
 
Contenuto Libro
Forma del prodotto Tascabile
Data pubblicazione 17.09.2016
Categoria Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica
 
EAN 9783319459301
ISBN 978-3-31-945930-1
Numero di pagine 271
Illustrazioni X, 271 p. 59 illus.
Dimensioni (della confezione) 15.6 x 1.7 x 23.7 cm
Peso (della confezione) 435 g
 
Serie Lecture Notes in Computer Science > 9895
Security and Cryptology > 9895
Categorie C, Computerhardware, Netzwerksicherheit, Wirtschaftsmathematik und -informatik, IT-Management, angewandte informatik, datensicherheit, Security, Kodierungstheorie und Verschlüsselung (Kryptologie), Privacy, Kryptografie, Verschlüsselungstechnologie, Sicherheit / Datensicherheit, Datensicherung, computer science, Information Retrieval, authentication, cryptography, Information Systems Applications (incl. Internet), Systems and Data Security, Data and Information Security, Management of Computing and Information Systems, Computer and Information Systems Applications, IT Operations, Application software, Maintenance & repairs, information architecture, Network Security, Computer security, Management information systems, Coding theory & cryptology, Internet searching, Computer Engineering and Networks, Computer Systems Organization and Communication Networks, Computer organization, Data encryption, Data encryption (Computer science), Cryptology, Computer networking & communications, Passwords, machinelearning, InformationSecurity, NetworkSecurity, embeddedsystems, accesscontrol, Intrusiondetection, dataprotection, AdvancedEncryptionStandard(AES), SystemsSecurity, keymanagement, Securityprotocols, SmartDevices, side-channelanalysis, SecurityPolicies
 

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.