Muutke küpsiste eelistusi

Foundations and Practice of Security: 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers 1st ed. 2017 [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 361 pages, kõrgus x laius: 235x155 mm, kaal: 5679 g, 83 Illustrations, black and white; XIII, 361 p. 83 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 10128
  • Ilmumisaeg: 29-Dec-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319519654
  • ISBN-13: 9783319519654
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 361 pages, kõrgus x laius: 235x155 mm, kaal: 5679 g, 83 Illustrations, black and white; XIII, 361 p. 83 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 10128
  • Ilmumisaeg: 29-Dec-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319519654
  • ISBN-13: 9783319519654
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016.The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions.The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.

Malware and Anomaly Detection.- Intrusion Response.- Vulnerability Analysis and Security Metrics.- Privacy and Verification.- Crypto and Communication Security.- Malware and Antivirus.- Web, Cloud, and Delegation.- Physical Security.
Malware and Anomaly Detection.- Intrusion Response.- Vulnerability
Analysis and Security Metrics.- Privacy and Verification.- Crypto and
Communication Security.- Malware and Antivirus.- Web, Cloud, and
Delegation.- Physical Security.