2017, ISBN: 9783319387079
[ED: Taschenbuch], [PU: Springer International Publishing], Neuware - This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy … Mehr…
booklooker.de |
2016, ISBN: 9783319387079
Springer, Taschenbuch, Auflage: Softcover reprint of the original 1st ed. 2015, 664 Seiten, Publiziert: 2016-10-17T00:00:01Z, Produktgruppe: Buch, 21.79 kg, Informationsmanagement, Manage… Mehr…
amazon.de Versandkosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
2016, ISBN: 9783319387079
Springer, Taschenbuch, Auflage: Softcover reprint of the original 1st ed. 2015, 664 Seiten, Publiziert: 2016-10-17T00:00:01Z, Produktgruppe: Buch, 21.79 kg, Informationsmanagement, Manage… Mehr…
amazon.de |
2015, ISBN: 9783319387079
*ICT Systems Security and Privacy Protection* - 30th IFIP TC 11 International Conference SEC 2015 Hamburg Germany May 26-28 2015 Proceedings. Softcover reprint of the original 1st ed. 201… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... in Information and Communication Technology) - gebrauchtes Buch
2015, ISBN: 3319387073
Livre
Rakuten.fr |
2017, ISBN: 9783319387079
[ED: Taschenbuch], [PU: Springer International Publishing], Neuware - This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy … Mehr…
2016, ISBN: 9783319387079
Springer, Taschenbuch, Auflage: Softcover reprint of the original 1st ed. 2015, 664 Seiten, Publiziert: 2016-10-17T00:00:01Z, Produktgruppe: Buch, 21.79 kg, Informationsmanagement, Manage… Mehr…
2016
ISBN: 9783319387079
Springer, Taschenbuch, Auflage: Softcover reprint of the original 1st ed. 2015, 664 Seiten, Publiziert: 2016-10-17T00:00:01Z, Produktgruppe: Buch, 21.79 kg, Informationsmanagement, Manage… Mehr…
2015, ISBN: 9783319387079
*ICT Systems Security and Privacy Protection* - 30th IFIP TC 11 International Conference SEC 2015 Hamburg Germany May 26-28 2015 Proceedings. Softcover reprint of the original 1st ed. 201… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - ICT Systems Security and Privacy Protection
EAN (ISBN-13): 9783319387079
ISBN (ISBN-10): 3319387073
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2015
Herausgeber: Springer International Publishing
Buch in der Datenbank seit 2016-11-21T14:40:45+01:00 (Berlin)
Detailseite zuletzt geändert am 2024-03-30T13:39:37+01:00 (Berlin)
ISBN/EAN: 9783319387079
ISBN - alternative Schreibweisen:
3-319-38707-3, 978-3-319-38707-9
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: göllmann, gollmann
Titel des Buches: hamburg, sec, germany
Daten vom Verlag:
Autor/in: Hannes Federrath; Dieter Gollmann
Titel: IFIP Advances in Information and Communication Technology; ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Verlag: Springer; Springer International Publishing
646 Seiten
Erscheinungsjahr: 2016-10-17
Cham; CH
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
POD
XVI, 646 p. 156 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Access control; Attack trees; Authentication; Cloud security; Critical infrastructures; Cryptography; Cyber-physical systems; Honey networks; Identity management; Mobile security; Network security; Password security; Privacy enhancing technologies; Software security; Trust management; Web application security; Data and Information Security; IT Operations; Computer Communication Networks; Cryptology; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; BB
O-PSI: Delegated Private Set Intersection on Outsourced Datasets.- Flexible and Robust Privacy-Preserving Implicit Authentication.- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack.- POSN: A Personal Online Social Network.- Verifying Observational Determinism.- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing.- Enforcing Usage Constraints on Credentials for Web Applications.- A Survey of Alerting Websites: Risks and Solutions.- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant.- Enhancing Passwords Security Using Deceptive Covert Communication.- Information Sharing and User Privacy in the Third-party Identity Management Landscape.- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems.- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control.- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems.- Authenticated File Broadcast Protocol.- Automated Classification of C&C Connections Through Malware URL Clustering.- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications.- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach.- Practice-Based Discourse Analysis of InfoSec Policies.- Understanding Collaborative Challenges in IT Security Preparedness Exercises.- Social Groupings and Information Security Obedience Within Organizations.- Attack Trees with Sequential Conjunction.- Enhancing the Security of Image CAPTCHAs Through Noise Addition.- SHRIFT System-Wide HybRid Information Flow Tracking.- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries.- Exploit Generation for Information Flow Leaks in Object-Oriented Programs.- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach.- Integrity for Approximate Joins on Untrusted Computational Servers.- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers.- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment.- A Secure Exam Protocol Without Trusted Parties.- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis.- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.- An Empirical Study on Android for Saving Non-shared Data on Public Storage.- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation.- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps.- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration.- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.- Securing BACnet’s Pitfalls.- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030076368 ICT Systems Security and Privacy Protection (Lech Jan Janczewski)
- 9783030076368 ICT Systems Security and Privacy Protection (Lech Jan Janczewski)
- 9783030582005 ICT Systems Security and Privacy Protection (Marko Hölbl; Kai Rannenberg; Tatjana Welzer)
- 9783030223144 Ict Systems Security And Privacy Protection: 34th Ifip Tc 11 International Conference, Sec 2019, Lisbon, Portugal, June 25-27, 201 (Gurpreet Dhillon; Fredrik Karlsson; Karin Hedström; André Zúquete)
- 9783030223113 ICT Systems Security and Privacy Protection (Herausgegeben:Zúquete, André; Karlsson, Fredrik; Hedström, Karin; Dhillon, Gurpreet)
- 9783030223120 ICT Systems Security and Privacy Protection (Gurpreet Dhillon; Fredrik Karlsson; Karin Hedström; André Zúquete)
< zum Archiv...