Image from Google Jackets

Security and Trust Management : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / edited by Sara Foresti.

Contributor(s): Material type: TextTextLanguage: İngilizce Series: Security and Cryptology ; 9331Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319248585
Subject(s): LOC classification:
  • QA76.9.A25
Online resources: Summary: This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Status Notes Date due Barcode
E-Book E-Book Merkez Kütüphane Merkez Kütüphane E-Kitap Koleksiyonu QA76.9.A25EBK (Browse shelf(Opens below)) Geçerli değil-e-Kitap / Not applicable-e-Book EBK00834

This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.

There are no comments on this title.

to post a comment.
Share
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.