Information Systems Security and Privacy

4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Systems Security and Privacy by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030251093
Publisher: Springer International Publishing Publication: July 4, 2019
Imprint: Springer Language: English
Author:
ISBN: 9783030251093
Publisher: Springer International Publishing
Publication: July 4, 2019
Imprint: Springer
Language: English

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.
The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.
The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.

More books from Springer International Publishing

Cover of the book Selberg Zeta Functions and Transfer Operators by
Cover of the book European Participation in International Operations by
Cover of the book Universities as Agencies by
Cover of the book Public Debt, Sustainability and Economic Growth by
Cover of the book Spirit of the Arts by
Cover of the book Fractional Derivatives with Mittag-Leffler Kernel by
Cover of the book The Economy of South Asia by
Cover of the book Pelvic Floor Ultrasound by
Cover of the book Self-organizing Coalitions for Managing Complexity by
Cover of the book Helium by
Cover of the book Formal Techniques for Safety-Critical Systems by
Cover of the book Experimental and Applied Mechanics, Volume 4 by
Cover of the book Experimental Agrometeorology: A Practical Manual by
Cover of the book Pharmacology of Mitochondria by
Cover of the book Bleach Plant Effluents from the Pulp and Paper Industry by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy