Information Systems Security and Privacy [electronic resource] : First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers / edited by Olivier Camp, Edgar Weippl, Christophe Bidan, Esma A�imeur.
Contributor(s): Camp, Olivier [editor.] | Weippl, Edgar [editor.] | Bidan, Christophe [editor.] | A�imeur, Esma [editor.] | SpringerLink (Online service).
Material type: BookSeries: Communications in Computer and Information Science: 576Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XII, 251 p. 111 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319276687.Subject(s): Computer science | Computer security | Computers and civilization | Management information systems | Computer Science | Systems and Data Security | Management of Computing and Information Systems | Information Systems Applications (incl. Internet) | Computers and SocietyAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers. .No physical items for this record
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers. .
There are no comments for this item.