|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-22915-7 |
003 |
DE-He213 |
005 |
20220117043622.0 |
007 |
cr nn 008mamaa |
008 |
150807s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319229157
|9 978-3-319-22915-7
|
024 |
7 |
|
|a 10.1007/978-3-319-22915-7
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security in Computing and Communications
|h [electronic resource] :
|b Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings /
|c edited by Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XXI, 548 p. 239 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 536
|
505 |
0 |
|
|a Security in cloud computing -- Authentication and access control Systems -- Cryptography and steganography -- System and network security -- Application security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
700 |
1 |
|
|a Abawajy, Jemal H.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mukherjea, Sougata.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Thampi, Sabu M.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ruiz-Martínez, Antonio.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319229140
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319229164
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 536
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-22915-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|