LEADER 03196nam 22007215 450 001 996500062903316 005 20230104072536.0 010 $a3-031-21280-0 024 7 $a10.1007/978-3-031-21280-2 035 $a(MiAaPQ)EBC7143470 035 $a(Au-PeEL)EBL7143470 035 $a(CKB)25402370400041 035 $a(DE-He213)978-3-031-21280-2 035 $a(PPN)266348726 035 $a(EXLCZ)9925402370400041 100 $a20221118d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Practice and Experience$b[electronic resource] $e17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23?25, 2022, Proceedings /$fedited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (643 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13620 311 08$aPrint version: Su, Chunhua Information Security Practice and Experience Cham : Springer International Publishing AG,c2023 9783031212796 327 $aBlockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography. 330 $aThis book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13620 606 $aData protection 606 $aComputer networks 606 $aComputer systems 606 $aApplication software 606 $aComputers 606 $aSecurity Services 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aComputer and Information Systems Applications 606 $aComputing Milieux 606 $aData and Information Security 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aApplication software. 615 0$aComputers. 615 14$aSecurity Services. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aComputer and Information Systems Applications. 615 24$aComputing Milieux. 615 24$aData and Information Security. 676 $a005.8 702 $aSu$b Chunhua 702 $aPiuri$b Vincenzo 702 $aGritzalis$b Dimitris 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996500062903316 996 $aInformation Security Practice and Experience$9772300 997 $aUNISA LEADER 01206nam 2200349 a 450 001 9910696902303321 005 20230902161557.0 035 $a(CKB)5470000002383874 035 $a(OCoLC)568987648 035 $a(EXLCZ)995470000002383874 100 $a20100325d2009 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTelecommunications$b[electronic resource] $ecurrent broadband measures have limitations, and new measures are promising but need improvement : report to congressional committees 210 1$a[Washington, D.C.] :$cU.S. Govt. Accountability Office,$d[2009] 215 $a1 online resource (ii, 49 pages) 300 $aTitle from PDF title screen (GAO, viewed Mar. 22, 2010). 300 $a"October 2009." 300 $a"GAO-10-49." 320 $aIncludes bibliographical references. 517 $aTelecommunications 606 $aBroadband communication systems$zUnited States 615 0$aBroadband communication systems 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910696902303321 996 $aTelecommunications$9455379 997 $aUNINA