Information Security

17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030114077
Publisher: Springer International Publishing Publication: January 24, 2019
Imprint: Springer Language: English
Author:
ISBN: 9783030114077
Publisher: Springer International Publishing
Publication: January 24, 2019
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.

The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.

The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

More books from Springer International Publishing

Cover of the book Scheduling by
Cover of the book The Product Manager's Toolkit® by
Cover of the book Infinitives and Gerunds in Recent English by
Cover of the book Genetic Programming Theory and Practice XVI by
Cover of the book Probability and Statistics for Particle Physics by
Cover of the book Advanced Control of Piezoelectric Micro-/Nano-Positioning Systems by
Cover of the book Public Medievalists, Racism, and Suffrage in the American Women’s College by
Cover of the book Augmented Cognition by
Cover of the book Advances in Intelligent Informatics, Smart Technology and Natural Language Processing by
Cover of the book Unifying Causality and Psychology by
Cover of the book Land-Atmospheric Research Applications in South and Southeast Asia by
Cover of the book Security and Safety Interplay of Intelligent Software Systems by
Cover of the book Anatomical Basis of Cranial Neurosurgery by
Cover of the book Breeding in a World of Scarcity by
Cover of the book Transport and Logistics in a Globalizing World by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy