Normal view MARC view ISBD view

Information Security Practice and Experience [electronic resource] : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang.

Contributor(s): Bao, Feng [editor.] | Chen, Liqun [editor.] | Deng, Robert H [editor.] | Wang, Guojun [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10060Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016.Description: XII, 380 p. 82 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319491516.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Data and Information Security | Cryptology | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
    average rating: 0.0 (0 votes)
No physical items for this record

Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

There are no comments for this item.

Log in to your account to post a comment.