|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-55415-5 |
003 |
DE-He213 |
005 |
20220120011741.0 |
007 |
cr nn 008mamaa |
008 |
140512s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642554155
|9 978-3-642-55415-5
|
024 |
7 |
|
|a 10.1007/978-3-642-55415-5
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a ICT Systems Security and Privacy Protection
|h [electronic resource] :
|b 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings /
|c edited by Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIV, 494 p. 94 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a IFIP Advances in Information and Communication Technology,
|x 1868-422X ;
|v 428
|
505 |
0 |
|
|a Intrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment -- Information flow control -- Identity management -- Identifiability and decision making -- Malicious behavior and fraud -- Organizational security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Database management.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Database Management.
|
700 |
1 |
|
|a Cuppens-Boulahia, Nora.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Cuppens, Frederic.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jajodia, Sushil.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Abou El Kalam, Anas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Sans, Thierry.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642554148
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642554162
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662515419
|
830 |
|
0 |
|a IFIP Advances in Information and Communication Technology,
|x 1868-422X ;
|v 428
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-55415-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|