Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security in computing and communicat...
~
SpringerLink (Online service)
Security in computing and communications = third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Security in computing and communications/ edited by Jemal H. Abawajy ... [et al.].
Reminder of title:
third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
remainder title:
SSCC 2015
other author:
Abawajy, Jemal H.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Cham :Springer International Publishing : : 2015.,
Description:
xxi, 548 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
Subject:
Computer security - Congresses. -
Online resource:
http://dx.doi.org/10.1007/978-3-319-22915-7
ISBN:
9783319229157
Security in computing and communications = third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
Security in computing and communications
third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /[electronic resource] :SSCC 2015edited by Jemal H. Abawajy ... [et al.]. - Cham :Springer International Publishing :2015. - xxi, 548 p. :ill., digital ;24 cm. - Communications in computer and information science,5361865-0929 ;. - Communications in computer and information science ;311..
Security in cloud computing -- Authentication and access control Systems -- Cryptography and steganography -- System and network security -- Application security.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
ISBN: 9783319229157
Standard No.: 10.1007/978-3-319-22915-7doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security in computing and communications = third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
LDR
:01878nam a2200361 a 4500
001
837121
003
DE-He213
005
20160325115121.0
006
m d
007
cr nn 008maaau
008
160421s2015 gw s 0 eng d
020
$a
9783319229157
$q
(electronic bk.)
020
$a
9783319229140
$q
(paper)
024
7
$a
10.1007/978-3-319-22915-7
$2
doi
035
$a
978-3-319-22915-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S774 2015
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Security in computing and communications
$h
[electronic resource] :
$b
third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015 : proceedings /
$c
edited by Jemal H. Abawajy ... [et al.].
246
3
$a
SSCC 2015
260
$a
Cham :
$c
2015.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xxi, 548 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
536
505
0
$a
Security in cloud computing -- Authentication and access control Systems -- Cryptography and steganography -- System and network security -- Application security.
520
$a
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
574534
$3
727814
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
674616
$3
727783
650
1 4
$a
Computer Science.
$3
593922
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
e-Commerce/e-business.
$3
768697
700
1
$a
Abawajy, Jemal H.
$3
1067752
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
776
0 8
$i
Printed edition:
$z
9783319229140
830
0
$a
Communications in computer and information science ;
$v
311.
$3
881211
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-22915-7
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login