menu
{ "item_title" : "Information Systems Security", "item_author" : [" R. Sekar", "Arun K. Pujari "], "item_description" : "This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/3/54/089/861/3540898611_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Information Systems Security|R. Sekar

Information Systems Security : 4th International Conference, Iciss 2008, Hyderabad, India, December 16-20, 2008, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.

This item is Non-Returnable

Details

  • ISBN-13: 9783540898610
  • ISBN-10: 3540898611
  • Publisher: Springer
  • Publish Date: November 2008
  • Dimensions: 9.2 x 6 x 0.8 inches
  • Shipping Weight: 1.05 pounds
  • Page Count: 307

Related Categories

You May Also Like...

    1

BAM Customer Reviews