03885nam 22008055 450 99646623120331620200630092215.03-319-26961-510.1007/978-3-319-26961-0(CKB)4340000000001227(SSID)ssj0001599542(PQKBManifestationID)16306019(PQKBTitleCode)TC0001599542(PQKBWorkID)14892398(PQKB)10276297(DE-He213)978-3-319-26961-0(MiAaPQ)EBC6281457(MiAaPQ)EBC5578356(Au-PeEL)EBL5578356(OCoLC)933389103(PPN)190884681(EXLCZ)99434000000000122720151216d2015 u| 0engurnn|008mamaatxtccrInformation Systems Security[electronic resource] 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings /edited by Sushil Jajoda, Chandan Mazumdar1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (XVI, 584 p. 156 illus. in color.) Security and Cryptology ;9478Bibliographic Level Mode of Issuance: Monograph3-319-26960-7 Access control -- Attacks and mitigation -- Cloud security -- Crypto systems and protocols -- Information flow control -- Sensor networks and cognitive radio -- Watermarking and steganography.This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.Security and Cryptology ;9478Computer securityData encryption (Computer science)Computer communication systemsAlgorithmsManagement information systemsComputer scienceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer security.Data encryption (Computer science).Computer communication systems.Algorithms.Management information systems.Computer science.Systems and Data Security.Cryptology.Computer Communication Networks.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.005.8Jajoda Sushiledthttp://id.loc.gov/vocabulary/relators/edtMazumdar Chandanedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466231203316Information Systems Security771916UNISA01156nam a2200265 i 450099100387142970753620030103125109.0020403s1989 it ||| | ita 8842503169b11876748-39ule_instPRUMB66933ExLDip.to SSSCita455Altieri Biagi, Maria Luisa38653Io amo, tu ami egli ama... :grammatica per italiani maggiorenni, ovvero come riattivare l'interesse per la lingua, riaccendere curiosità insoddisfatte, recuperare un amore deluso dai tanti paradigmi della grammatica che ha impressionato la nostra adolescenza sui banchi di scuola /Maria Luisa Altieri BiagiMilano :Mursia,1989235 p. :ill. ;28 cm.Testi [Mursia] ;5Lingua italiana - Grammatica.b1187674828-04-1707-01-03991003871429707536LE021 DI1D11LE021N-6630le021-E0.00-l- 00000.i1213123407-01-03Io amo, tu ami egli ama...900570UNISALENTOle02101-01-02ma -itait 01