Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

by Miroslaw Kutylowski, Jaideep Vaidya
ISBN-10:
3319112023
ISBN-13:
9783319112022
Pub. Date:
08/12/2014
Publisher:
Springer International Publishing
ISBN-10:
3319112023
ISBN-13:
9783319112022
Pub. Date:
08/12/2014
Publisher:
Springer International Publishing
Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

by Miroslaw Kutylowski, Jaideep Vaidya

Paperback

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.

Product Details

ISBN-13: 9783319112022
Publisher: Springer International Publishing
Publication date: 08/12/2014
Series: Lecture Notes in Computer Science , #8712
Edition description: 2014
Pages: 545
Product dimensions: 6.10(w) x 9.25(h) x 0.04(d)

Table of Contents

Cryptography, formal methods and theory of security.- Security services.- Intrusion/anomaly detection and malware mitigation.- Security in hardware.- Systems security.- Network security.- Database and storage security.- Software and application security.- Human and societal aspects of security and privacy.
From the B&N Reads Blog

Customer Reviews