Normal view MARC view ISBD view

Information Security Practice and Experience [electronic resource] : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang.

Contributor(s): Bao, Feng [editor.] | Chen, Liqun [editor.] | Deng, Robert H [editor.] | Wang, Guojun [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 10060Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Description: XII, 380 p. 82 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319491516.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Management information systems | Computer Science | Systems and Data Security | Data Encryption | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.
In: Springer eBooksSummary: This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
    average rating: 0.0 (0 votes)
No physical items for this record

Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

There are no comments for this item.

Log in to your account to post a comment.