Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Applications and Techniques in Information Security

E-BookPDF1 - PDF WatermarkE-Book
313 Seiten
Englisch
Springer Nature Singaporeerschienen am15.11.20191st ed. 2019
This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019.
The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.
mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49

Produkt

KlappentextThis book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019.
The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.
Details
Weitere ISBN/GTIN9789811508714
ProduktartE-Book
EinbandartE-Book
FormatPDF
Format Hinweis1 - PDF Watermark
FormatE107
Erscheinungsjahr2019
Erscheinungsdatum15.11.2019
Auflage1st ed. 2019
Reihen-Nr.1116
Seiten313 Seiten
SpracheEnglisch
IllustrationenXI, 313 p. 157 illus., 101 illus. in color.
Artikel-Nr.5024329
Rubriken
Genre9200

Inhalt/Kritik

Inhaltsverzeichnis
Information Security.- Network Security.- Intrusion Detection System.- Authentication and Key Management System.- Security Centric Applications.mehr

Autor