Information Security

17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030114077
Publisher: Springer International Publishing Publication: January 24, 2019
Imprint: Springer Language: English
Author:
ISBN: 9783030114077
Publisher: Springer International Publishing
Publication: January 24, 2019
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.

The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.

The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

More books from Springer International Publishing

Cover of the book Computational Science and Its Applications – ICCSA 2017 by
Cover of the book Insecurity, Precarious Work and Labour Markets by
Cover of the book New Perspectives on Approximation and Sampling Theory by
Cover of the book Granular Computing in Decision Approximation by
Cover of the book Modern Stochastics and Applications by
Cover of the book Galileo and the Equations of Motion by
Cover of the book Proceedings of the 9th International Symposium on Superalloy 718 & Derivatives: Energy, Aerospace, and Industrial Applications by
Cover of the book Memory Controllers for Mixed-Time-Criticality Systems by
Cover of the book Therapeutic Intranasal Delivery for Stroke and Neurological Disorders by
Cover of the book Pediatric Anesthesiology Review by
Cover of the book Applied Computing and Information Technology by
Cover of the book Palaeobiology of Middle Paleozoic Marine Brachiopods by
Cover of the book The Palgrave Handbook of Languages and Conflict by
Cover of the book Fashioning England and the English by
Cover of the book Periodizing Capitalism and Capitalist Extinction by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy