Normal view MARC view ISBD view

Engineering Secure Software and Systems [electronic resource] : 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings / edited by Mathias Payer, Awais Rashid, Jose M. Such.

Contributor(s): Payer, Mathias [editor.] | Rashid, Awais [editor.] | Such, Jose M [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Theoretical Computer Science and General Issues: 10953Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: IX, 133 p. 36 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319944968.Subject(s): Data protection | Computers | Data and Information Security | Computing MilieuxAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors.

There are no comments for this item.

Log in to your account to post a comment.