9783319184661-3319184660-ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, 455)

ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, 455)

FREE US shipping
Buy

From $29.70

Summary

ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, 455) (ISBN-13: 9783319184661 and ISBN-10: 3319184660), written by authors Dieter Gollmann, Hannes Federrath, was published by Springer in 2015. With an overall rating of 4.0 stars, it's a notable title among other Information Management (Processes & Infrastructure, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Cloud Computing, Networking & Cloud Computing, Management & Leadership) books. You can easily purchase or rent ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, 455) (Hardcover) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book