00964nam0 22002651i 450 UON0033360420231205104230.12120090925d1977 |0itac50 baitaIT|||| |||||Le democrazie socialisteRoy A. Medvedeva cura di Sergio RapettiFirenzeVallecchi1977XXIII, 410 p.23 cm.Democrazia e socialismoUONC069462FIITFirenzeUONL000052MEDVEDEVRojUONV128800173681RAPETTISergioUONV126395VallecchiUONV246715650ITSOL20250704RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00333604SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI PUB H 0078 SI SC 2633 5 0078 Democrazie socialiste1365234UNIOR03528nam 22007815 450 991034938730332120251225205518.09783030051716303005171410.1007/978-3-030-05171-6(CKB)4100000007204829(DE-He213)978-3-030-05171-6(MiAaPQ)EBC6248180(PPN)232963819(EXLCZ)99410000000720482920181205d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /edited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XIX, 481 p. 134 illus., 83 illus. in color.) Security and Cryptology,2946-1863 ;112819783030051709 3030051706 Includes bibliographical references and index.Security for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication.This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.Security and Cryptology,2946-1863 ;11281Data protectionComputersComputer visionSoftware engineeringComputer networksElectronic digital computersEvaluationData and Information SecurityComputing MilieuxComputer VisionSoftware EngineeringComputer Communication NetworksSystem Performance and EvaluationData protection.Computers.Computer vision.Software engineering.Computer networks.Electronic digital computersEvaluation.Data and Information Security.Computing Milieux.Computer Vision.Software Engineering.Computer Communication Networks.System Performance and Evaluation.005.8005.8Ganapathy Vinodedthttp://id.loc.gov/vocabulary/relators/edtJaeger Trentedthttp://id.loc.gov/vocabulary/relators/edtShyamasundar R.Kedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349387303321Information Systems Security3660336UNINA