|
|
|
|
LEADER |
02988nam a22005775i 4500 |
001 |
978-3-319-49151-6 |
003 |
DE-He213 |
005 |
20210624183028.0 |
007 |
cr nn 008mamaa |
008 |
161104s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319491516
|9 978-3-319-49151-6
|
024 |
7 |
|
|a 10.1007/978-3-319-49151-6
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Security Practice and Experience
|h [electronic resource] :
|b 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings /
|c edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XII, 380 p. 82 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10060
|
505 |
0 |
|
|a Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.
|
520 |
|
|
|a This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I24067
|
700 |
1 |
|
|a Bao, Feng.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Chen, Liqun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Deng, Robert H.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, Guojun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319491509
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319491523
|
830 |
|
0 |
|a Security and Cryptology ;
|v 10060
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-49151-6
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|