Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Applications and techniques in infor...
~
SpringerLink (Online service)
Applications and techniques in information security = 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Applications and techniques in information security/ edited by Lynn Batten ... [et al.].
Reminder of title:
8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /
remainder title:
ATIS 2017
other author:
Batten, Lynn.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Singapore :Springer Singapore : : 2017.,
Description:
xiv, 223 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
Subject:
Computer security - Congresses. -
Online resource:
http://dx.doi.org/10.1007/978-981-10-5421-1
ISBN:
9789811054211
Applications and techniques in information security = 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /
Applications and techniques in information security
8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /[electronic resource] :ATIS 2017edited by Lynn Batten ... [et al.]. - Singapore :Springer Singapore :2017. - xiv, 223 p. :ill., digital ;24 cm. - Communications in computer and information science,7191865-0929 ;. - Communications in computer and information science ;311..
Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security.
This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.
ISBN: 9789811054211
Standard No.: 10.1007/978-981-10-5421-1doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Applications and techniques in information security = 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /
LDR
:01855nam a2200349 a 4500
001
905602
003
DE-He213
005
20170622153731.0
006
m d
007
cr nn 008maaau
008
190308s2017 si s 0 eng d
020
$a
9789811054211
$q
(electronic bk.)
020
$a
9789811054204
$q
(paper)
024
7
$a
10.1007/978-981-10-5421-1
$2
doi
035
$a
978-981-10-5421-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A872 2017
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Applications and techniques in information security
$h
[electronic resource] :
$b
8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017 : proceedings /
$c
edited by Lynn Batten ... [et al.].
246
3
$a
ATIS 2017
260
$a
Singapore :
$c
2017.
$b
Springer Singapore :
$b
Imprint: Springer,
300
$a
xiv, 223 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
719
505
0
$a
Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security.
520
$a
This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
574534
$3
727814
650
1 4
$a
Computer Science.
$3
593922
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Data Encryption.
$3
669790
650
2 4
$a
Algorithm Analysis and Problem Complexity.
$3
593923
700
1
$a
Batten, Lynn.
$3
1113492
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Communications in computer and information science ;
$v
311.
$3
881211
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-5421-1
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login