Coverart for item
The Resource Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti, (electronic book)

Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti, (electronic book)

Label
Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings
Title
Information Systems Security
Title remainder
12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings
Statement of responsibility
edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
Contributor
Editor
Subject
Language
eng
Summary
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.
Member of
Cataloging source
UPM
Dewey number
005.8
Index
no index present
LC call number
QA76.9.A25
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Ray, Indrajit.
  • Gaur, Manoj Singh.
  • Conti, Mauro.
  • Sanghi, Dheeraj.
  • Kamakoti, V.
Series statement
Lecture Notes in Computer Science,
Series volume
10063
http://library.link/vocab/subjectName
  • Computer science
  • Computer networks
  • Computer security
  • Data encryption (Computer science)
  • Algorithms
  • Management information systems
  • Computer Science
  • Systems and Data Security
  • Security
  • Data Encryption
  • Computer Communication Networks
  • Algorithm Analysis and Problem Complexity
  • Management of Computing and Information Systems
Label
Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti, (electronic book)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security.
Dimensions
unknown
Extent
1 online resource (XV, 544 p. 134 illus.)
File format
multiple file formats
Form of item
online
Isbn
9783319498065
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-49806-5
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • SPR967711943
  • ocn967711943
Label
Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti, (electronic book)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security.
Dimensions
unknown
Extent
1 online resource (XV, 544 p. 134 illus.)
File format
multiple file formats
Form of item
online
Isbn
9783319498065
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-49806-5
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • SPR967711943
  • ocn967711943

Library Locations

Processing Feedback ...