|
|
|
|
LEADER |
03034nam a22005655i 4500 |
001 |
978-3-642-55415-5 |
003 |
DE-He213 |
005 |
20151103121016.0 |
007 |
cr nn 008mamaa |
008 |
140512s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642554155
|9 978-3-642-55415-5
|
024 |
7 |
|
|a 10.1007/978-3-642-55415-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a ICT Systems Security and Privacy Protection
|h [electronic resource] :
|b 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings /
|c edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIV, 494 p. 94 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a IFIP Advances in Information and Communication Technology,
|x 1868-4238 ;
|v 428
|
505 |
0 |
|
|a Intrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment -- Information flow control -- Identity management -- Identifiability and decision making -- Malicious behavior and fraud -- Organizational security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Database Management.
|
700 |
1 |
|
|a Cuppens-Boulahia, Nora.
|e editor.
|
700 |
1 |
|
|a Cuppens, Frédéric.
|e editor.
|
700 |
1 |
|
|a Jajodia, Sushil.
|e editor.
|
700 |
1 |
|
|a Abou El Kalam, Anas.
|e editor.
|
700 |
1 |
|
|a Sans, Thierry.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642554148
|
830 |
|
0 |
|a IFIP Advances in Information and Communication Technology,
|x 1868-4238 ;
|v 428
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-55415-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|