Normal view MARC view ISBD view

Applications and Techniques in Information Security [electronic resource] : 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings / edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren.

Contributor(s): Batten, Lynn [editor.] | Li, Gang [editor.] | Niu, Wenjia [editor.] | Warren, Matthew [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Communications in Computer and Information Science: 490Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014Description: XII, 266 p. 120 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783662456705.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Computer Science | Systems and Data Security | Data EncryptionAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.
    average rating: 0.0 (0 votes)
No physical items for this record

Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations.

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.

There are no comments for this item.

Log in to your account to post a comment.