ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, 455)
ISBN-13:
9783319184661
ISBN-10:
3319184660
Edition:
2015
Author:
Dieter Gollmann, Hannes Federrath
Publication date:
2015
Publisher:
Springer
Format:
Hardcover
662 pages
FREE US shipping
Book details
ISBN-13:
9783319184661
ISBN-10:
3319184660
Edition:
2015
Author:
Dieter Gollmann, Hannes Federrath
Publication date:
2015
Publisher:
Springer
Format:
Hardcover
662 pages
Summary
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, 455) (ISBN-13: 9783319184661 and ISBN-10: 3319184660), written by authors
Dieter Gollmann, Hannes Federrath, was published by Springer in 2015.
With an overall rating of 4.0 stars, it's a notable title among other
Information Management
(Processes & Infrastructure, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Cloud Computing, Networking & Cloud Computing, Management & Leadership) books. You can easily purchase or rent ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, 455) (Hardcover) from BooksRun,
along with many other new and used
Information Management
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}