000 | 03043nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-642-55415-5 | ||
003 | DE-He213 | ||
005 | 20200421111206.0 | ||
007 | cr nn 008mamaa | ||
008 | 140512s2014 gw | s |||| 0|eng d | ||
020 |
_a9783642554155 _9978-3-642-55415-5 |
||
024 | 7 |
_a10.1007/978-3-642-55415-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aICT Systems Security and Privacy Protection _h[electronic resource] : _b29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings / _cedited by Nora Cuppens-Boulahia, Fr�ed�eric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXIV, 494 p. 94 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v428 |
|
505 | 0 | _aIntrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment -- Information flow control -- Identity management -- Identifiability and decision making -- Malicious behavior and fraud -- Organizational security. | |
520 | _aThis book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aDatabase management. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aDatabase Management. |
700 | 1 |
_aCuppens-Boulahia, Nora. _eeditor. |
|
700 | 1 |
_aCuppens, Fr�ed�eric. _eeditor. |
|
700 | 1 |
_aJajodia, Sushil. _eeditor. |
|
700 | 1 |
_aAbou El Kalam, Anas. _eeditor. |
|
700 | 1 |
_aSans, Thierry. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642554148 |
830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v428 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-55415-5 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c54123 _d54123 |