Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Choose an application
Choose an application
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- bedrijfssoftware --- computers --- informatica --- maatschappij --- informatiesystemen --- informatica management --- computernetwerken --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.
Computer science. --- Computer Communication Networks. --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Computer Science. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer communication systems. --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer security --- Data protection --- Cryptology. --- Science --- Cryptography --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Algebra --- Arithmetic --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Communication systems --- Distributed processing --- Computer networks. --- Cryptography. --- IT Operations. --- Computer and Information Systems Applications. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
Choose an application
Choose an application
Listing 1 - 7 of 7 |
Sort by
|