|
|
|
|
LEADER |
03013nam a22005535i 4500 |
001 |
16127 |
003 |
DE-He213 |
005 |
20130727082716.0 |
007 |
cr nn 008mamaa |
008 |
130703s2013 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642392184
|9 978-3-642-39218-4
|
024 |
7 |
# |
|a 10.1007/978-3-642-39218-4
|2 doi
|
050 |
# |
4 |
|a TK5105.5-5105.9
|
072 |
# |
7 |
|a UKN
|2 bicssc
|
072 |
# |
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
# |
|a Janczewski, Lech J.
|e editor.
|
245 |
1 |
0 |
|a Security and Privacy Protection in Information Processing Systems
|b 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings /
|c edited by Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
# |
# |
|a XIV, 436 p. 117 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a IFIP Advances in Information and Communication Technology,
|v 405
|x 1868-4238 ;
|
505 |
0 |
# |
|a Malware, authentication and authorization -- Network security/cryptography -- Software security, policy compliance and obligations -- Privacy protection -- Risk analysis and security metrics -- Social engineering -- Security management/forensics.
|
520 |
# |
# |
|a This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Computer software.
|
650 |
# |
0 |
|a Information Systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
700 |
1 |
# |
|a Wolfe, Henry B.
|e editor.
|
700 |
1 |
# |
|a Shenoi, Sujeet.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642392177
|
830 |
# |
0 |
|a IFIP Advances in Information and Communication Technology,
|v 405
|x 1868-4238 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-39218-4
|
912 |
# |
# |
|a ZDB-2-SCS
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|