000 | 03049nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-642-39218-4 | ||
003 | DE-He213 | ||
005 | 20200420220217.0 | ||
007 | cr nn 008mamaa | ||
008 | 130703s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642392184 _9978-3-642-39218-4 |
||
024 | 7 |
_a10.1007/978-3-642-39218-4 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aSecurity and Privacy Protection in Information Processing Systems _h[electronic resource] : _b28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings / _cedited by Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXIII, 436 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v405 |
|
505 | 0 | _aMalware, authentication and authorization -- Network security/cryptography -- Software security, policy compliance and obligations -- Privacy protection -- Risk analysis and security metrics -- Social engineering -- Security management/forensics. | |
520 | _aThis book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aJanczewski, Lech J. _eeditor. |
|
700 | 1 |
_aWolfe, Henry B. _eeditor. |
|
700 | 1 |
_aShenoi, Sujeet. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642392177 |
830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v405 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-39218-4 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c51673 _d51673 |