Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers

Author:   Hein Venter ,  Marianne Loock ,  Marijke Coetzee ,  Mariki Eloff
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   973
ISBN:  

9783030114060


Pages:   193
Publication Date:   25 January 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $155.22 Quantity:  
Add to Cart

Share |

Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers


Add your own review!

Overview

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Full Product Details

Author:   Hein Venter ,  Marianne Loock ,  Marijke Coetzee ,  Mariki Eloff
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   973
Weight:   0.454kg
ISBN:  

9783030114060


ISBN 10:   3030114066
Pages:   193
Publication Date:   25 January 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Authentication.- Access control.- Digital (cyber) forensics.- Cyber security.- Mobile and wireless security.- Privacy-preserving protocols.- Authorization.- Trust frameworks.- Security requirements.- Formal security models.- Malware and its mitigation.- Intrusion detection systems.- Social engineering.- Operating systems security.- Browser security.- Denial-of-service attacks.- Vulnerability management.- File system security.- Firewalls.- Web protocol security.- Digital rights management.- Distributed systems security.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List