Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, ... and Communication Technology, 354)
ISBN-13:
9783642214233
ISBN-10:
3642214231
Edition:
2011
Author:
Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder
Publication date:
2011
Publisher:
Springer
Format:
Hardcover
344 pages
FREE US shipping
Book details
ISBN-13:
9783642214233
ISBN-10:
3642214231
Edition:
2011
Author:
Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder
Publication date:
2011
Publisher:
Springer
Format:
Hardcover
344 pages
Summary
Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, ... and Communication Technology, 354) (ISBN-13: 9783642214233 and ISBN-10: 3642214231), written by authors
Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder, was published by Springer in 2011.
With an overall rating of 4.1 stars, it's a notable title among other
Information Management
(Processes & Infrastructure, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Algorithms, Programming, History & Culture, Management & Leadership) books. You can easily purchase or rent Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, ... and Communication Technology, 354) (Hardcover) from BooksRun,
along with many other new and used
Information Management
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}