Information Systems Security (Record no. 58695)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03063nam a22006255i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-49806-5 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421112548.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 161123s2016 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319498065 |
-- | 978-3-319-49806-5 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Information Systems Security |
Sub Title | 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XV, 544 p. 134 illus. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. . |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. . |
700 1# - AUTHOR 2 | |
Author 2 | Ray, Indrajit. |
700 1# - AUTHOR 2 | |
Author 2 | Gaur, Manoj Singh. |
700 1# - AUTHOR 2 | |
Author 2 | Conti, Mauro. |
700 1# - AUTHOR 2 | |
Author 2 | Sanghi, Dheeraj. |
700 1# - AUTHOR 2 | |
Author 2 | Kamakoti, V. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-49806-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2016. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer communication systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Algorithms. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management information systems. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Algorithm Analysis and Problem Complexity. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management of Computing and Information Systems. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 0302-9743 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.