| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910337567303321 |
|
|
Titolo |
Information Security : 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers / / edited by Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVI, 193 p. 38 illus., 23 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 973 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Application software |
Computers - Law and legislation |
Information technology - Law and legislation |
Computer engineering |
Computer networks |
Data and Information Security |
Computer and Information Systems Applications |
Legal Aspects of Computing |
Computer Engineering and Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Authentication -- Access control -- Digital (cyber) forensics -- Cyber security -- Mobile and wireless security -- Privacy-preserving protocols -- Authorization -- Trust frameworks -- Security requirements -- Formal security models -- Malware and its mitigation -- Intrusion detection systems -- Social engineering -- Operating systems security -- Browser security -- Denial-of-service attacks -- Vulnerability management -- File system security -- Firewalls -- Web protocol security -- Digital rights management -- Distributed systems security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in |
|
|
|
|
|
|
|
|
|
|
Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security. |
|
|
|
|
|
| |