|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-39218-4 |
003 |
DE-He213 |
005 |
20220117205149.0 |
007 |
cr nn 008mamaa |
008 |
130703s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642392184
|9 978-3-642-39218-4
|
024 |
7 |
|
|a 10.1007/978-3-642-39218-4
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Security and Privacy Protection in Information Processing Systems
|h [electronic resource] :
|b 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, Proceedings /
|c edited by Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XIII, 436 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a IFIP Advances in Information and Communication Technology,
|x 1868-422X ;
|v 405
|
505 |
0 |
|
|a Malware, authentication and authorization -- Network security/cryptography -- Software security, policy compliance and obligations -- Privacy protection -- Risk analysis and security metrics -- Social engineering -- Security management/forensics.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Janczewski, Lech J.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wolfe, Henry B.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Shenoi, Sujeet.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642431395
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642392177
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642392191
|
830 |
|
0 |
|a IFIP Advances in Information and Communication Technology,
|x 1868-422X ;
|v 405
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-39218-4
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|