LEADER 00968nam0-2200349---450- 001 990007102990403321 005 20070212163557.0 010 $a958-35-0175-1 035 $a000710299 035 $aFED01000710299 035 $a(Aleph)000710299FED01 035 $a000710299 100 $a20020705d1998----km-y0itay50------ba 101 0 $aspa 102 $aCO 105 $ay---n---001yy 200 1 $a<>impuesto sobre el valor agregado IVA$fMauricio A. Plazas Vega 205 $a2. ed. 210 $aSanta Fe de Bogotá$cTemis$d1998 215 $aXLVII, 1024 p.$d26 cm 676 $a343.055$v21$zita 700 1$aPlazas Vega,$bMauricio Alfredo$0261502 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007102990403321 952 $aH 1580$bs.i.$fDSS 952 $aH 347$bs.i.$fDSS 952 $aXIV C 302$b43876*$fFGBC 959 $aFGBC 959 $aDSS 996 $aImpuesto sobre el valor agregado IVA$9705343 997 $aUNINA LEADER 03375nam 22007335 450 001 9910299353103321 005 20251225203450.0 010 $a3-319-99828-5 024 7 $a10.1007/978-3-319-99828-2 035 $a(CKB)4100000006519886 035 $a(DE-He213)978-3-319-99828-2 035 $a(MiAaPQ)EBC6221525 035 $a(PPN)230539270 035 $a(EXLCZ)994100000006519886 100 $a20180825d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings /$fedited by Lech Jan Janczewski, Miros?aw Kuty?owski 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIII, 400 p. 100 illus.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v529 311 08$a3-319-99827-7 330 $aThis book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 27 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in the following topical sections: authentication, failures of security management, security management/forensic, and software security/attacks. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v529 606 $aData protection 606 $aApplication software 606 $aComputers and civilization 606 $aCryptography 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aComputers, Special purpose 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputers and Society 606 $aCryptology 606 $aArtificial Intelligence 606 $aSpecial Purpose and Application-Based Systems 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers and civilization. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 0$aComputers, Special purpose. 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputers and Society. 615 24$aCryptology. 615 24$aArtificial Intelligence. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 702 $aJanczewski$b Lech Jan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKuty?owski$b Miros?aw$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299353103321 996 $aICT Systems Security and Privacy Protection$92034030 997 $aUNINA