Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

Author:   Miroslaw Kutylowski ,  Jaideep Vaidya
Publisher:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8712
ISBN:  

9783319112022


Pages:   545
Publication Date:   23 September 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I


Add your own review!

Overview

The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.

Full Product Details

Author:   Miroslaw Kutylowski ,  Jaideep Vaidya
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8712
Dimensions:   Width: 15.50cm , Height: 2.90cm , Length: 23.50cm
Weight:   8.424kg
ISBN:  

9783319112022


ISBN 10:   3319112023
Pages:   545
Publication Date:   23 September 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Cryptography, formal methods and theory of security.- Security services.- Intrusion/anomaly detection and malware mitigation.- Security in hardware.- Systems security.- Network security.- Database and storage security.- Software and application security.- Human and societal aspects of security and privacy.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List