9783319113784-331911378X-Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Lecture Notes in Computer Science, 8688)

Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Lecture Notes in Computer Science, 8688)

ISBN-13: 9783319113784
ISBN-10: 331911378X
Edition: 2014
Author: Herbert Bos, Angelos Stavrou, Georgios Portokalidis
Publication date: 2014
Publisher: Springer
Format: Paperback 504 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783319113784
ISBN-10: 331911378X
Edition: 2014
Author: Herbert Bos, Angelos Stavrou, Georgios Portokalidis
Publication date: 2014
Publisher: Springer
Format: Paperback 504 pages

Summary

Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Lecture Notes in Computer Science, 8688) (ISBN-13: 9783319113784 and ISBN-10: 331911378X), written by authors Herbert Bos, Angelos Stavrou, Georgios Portokalidis, was published by Springer in 2014. With an overall rating of 3.7 stars, it's a notable title among other books. You can easily purchase or rent Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Lecture Notes in Computer Science, 8688) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book