|
|
|
|
LEADER |
04395nam a2200577 4500 |
001 |
978-3-030-11407-7 |
003 |
DE-He213 |
005 |
20191220130324.0 |
007 |
cr nn 008mamaa |
008 |
190124s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030114077
|9 978-3-030-11407-7
|
024 |
7 |
|
|a 10.1007/978-3-030-11407-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Security
|h [electronic resource] :
|b 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers /
|c edited by Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XVI, 193 p. 38 illus., 23 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 973
|
505 |
0 |
|
|a Authentication -- Access control -- Digital (cyber) forensics -- Cyber security -- Mobile and wireless security -- Privacy-preserving protocols -- Authorization -- Trust frameworks -- Security requirements -- Formal security models -- Malware and its mitigation -- Intrusion detection systems -- Social engineering -- Operating systems security -- Browser security -- Denial-of-service attacks -- Vulnerability management -- File system security -- Firewalls -- Web protocol security -- Digital rights management -- Distributed systems security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
|
0 |
|a Computer organization.
|
650 |
1 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I24059
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13006
|
700 |
1 |
|
|a Venter, Hein.
|e editor.
|0 (orcid)0000-0002-3607-8630
|1 https://orcid.org/0000-0002-3607-8630
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Loock, Marianne.
|e editor.
|0 (orcid)0000-0001-8005-716X
|1 https://orcid.org/0000-0001-8005-716X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Coetzee, Marijke.
|e editor.
|0 (orcid)0000-0002-9157-3079
|1 https://orcid.org/0000-0002-9157-3079
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Eloff, Mariki.
|e editor.
|0 (orcid)0000-0001-8997-7931
|1 https://orcid.org/0000-0001-8997-7931
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Eloff, Jan.
|e editor.
|0 (orcid)0000-0003-4683-2198
|1 https://orcid.org/0000-0003-4683-2198
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030114060
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030114084
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 973
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-11407-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|