Information and Communications Security (häftad)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
414
Utgivningsdatum
2013-10-16
Upplaga
2013 ed.
Förlag
Springer International Publishing AG
Medarbetare
Liu, Dongmei (ed.), Qing, Sihan (ed.), Zhou, Jianying (ed.)
Illustrationer
94 Illustrations, black and white; XIV, 414 p. 94 illus.
Dimensioner
234 x 156 x 22 mm
Vikt
599 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9783319027258

Information and Communications Security

15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings

Häftad,  Engelska, 2013-10-16
586
  • Skickas från oss inom 7-10 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.
Visa hela texten

Passar bra ihop

  1. Information and Communications Security
  2. +
  3. Digital Minimalism

De som köpt den här boken har ofta också köpt Digital Minimalism av Cal Newport (häftad).

Köp båda 2 för 720 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Innehållsförteckning

System Security.- Web Security and Worm Detection.- Cloud Storage Security.- Virtualization for Cloud Computing.- Trusted and Trustworthy Computing.- Authentication and Security Protocols.- Intrusion Detection and Recovery.- Side Channel Attacks and Defense.- Engineering Issues of Crypto.- Cryptanalysis.- Attribute-Based Encryption.- Cryptographic Primitives and Applications.