9783642214233-3642214231-Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, ... and Communication Technology, 354)

Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, ... and Communication Technology, 354)

FREE US shipping

Summary

Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, ... and Communication Technology, 354) (ISBN-13: 9783642214233 and ISBN-10: 3642214231), written by authors Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder, was published by Springer in 2011. With an overall rating of 4.1 stars, it's a notable title among other Information Management (Processes & Infrastructure, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Algorithms, Programming, History & Culture, Management & Leadership) books. You can easily purchase or rent Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, ... and Communication Technology, 354) (Hardcover) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book