Information Security Practice and Experience [recurso electrónico] : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 10060Editor: Cham : Springer International Publishing : Imprint: Springer, 2016Descripción: XII, 380 p. 82 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783319491516Tema(s): Computer science | Computer security | Data encryption (Computer science) | Management information systems | Computer Science | Systems and Data Security | Data Encryption | Management of Computing and Information SystemsFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónico
Contenidos:
En: Springer eBooksResumen: This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.
Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | 1 | No para préstamo |
Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.