Cargando…

Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings /

This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application se...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jøsang, Audun (Editor ), Carlsson, Bengt (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:Security and Cryptology ; 7617
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-34210-3
003 DE-He213
005 20220115081425.0
007 cr nn 008mamaa
008 121026s2012 gw | s |||| 0|eng d
020 |a 9783642342103  |9 978-3-642-34210-3 
024 7 |a 10.1007/978-3-642-34210-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Secure IT Systems  |h [electronic resource] :  |b 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings /  |c edited by Audun Jøsang, Bengt Carlsson. 
250 |a 1st ed. 2012. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2012. 
300 |a X, 247 p. 62 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 7617 
505 0 |a Designed to Fail: A USB-Connected Reader for Online Banking -- Security Add-Ons for Mobile Platforms -- THAPS: Automated Vulnerability Scanning of PHP Applications -- Cyber security exercises and competitions as a platform for cyber security experiments -- The Development of Cyber Security Warning, Advice & Report Points -- Towards an Empirical Examination of IT Security Infrastructures in SME -- How to Select a Security Requirements Method? A comparative study with students and practitioners -- There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication -- Coinductive Unwinding of Security-Relevant -- Retooling and Securing Systemic Debugging -- Cracking Associative Passwords -- A Hybrid Approach for Highly Available & Secure Storage of Pseudo-SSO Credentials -- Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links -- Everything but the Kitchen Sink: Determining the effect of multiple attacks on privacy preserving technology users -- Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites using Supervised Learning? -- Privacy-Friendly Cloud Storage for the Data Track. 
520 |a This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management. 
650 0 |a Data protection. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Coding theory. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Application software. 
650 0 |a Electronic data processing-Management. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Cryptology. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a IT Operations. 
700 1 |a Jøsang, Audun.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Carlsson, Bengt.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642342110 
776 0 8 |i Printed edition:  |z 9783642342097 
830 0 |a Security and Cryptology ;  |v 7617 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-34210-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)