aller au contenu
Secure IT systems : 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012 : proceedings Aperçu de cet ouvrage
FermerAperçu de cet ouvrage
Vérifiant…

Secure IT systems : 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012 : proceedings

Auteur : Audun Jøsang; Bengt Carlsson
Éditeur : Heidelberg ; New York : Springer, ©2012
Collection : Lecture notes in computer science, 7617.; LNCS sublibrary., SL 4,, Security and cryptology.
Édition/format :   Livre électronique : Document : Publication de conférence : AnglaisVoir toutes les éditions et les formats
Base de données :WorldCat
Résumé :
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.
Évaluation :

(pas encore évalué) 0 avec des critiques - Soyez le premier.

Sujets
Plus comme ceci

 

Trouver un exemplaire en ligne

Liens vers cet ouvrage

Trouver un exemplaire dans la bibliothèque

&AllPage.SpinnerRetrieving; Recherche de bibliothèques qui possèdent cet ouvrage...

Détails

Genre/forme : Electronic books
Conference proceedings
Congresses
Format – détails additionnels : Print version:
Nordic Conference on Secure IT Systems (17th : 2012 : Karlskrona, Sweden).
Secure IT systems.
Heidelberg ; New York : Springer, c2012
(OCoLC)824824932
Type d’ouvrage : Publication de conférence, Document, Ressource Internet
Format : Ressource Internet, Fichier informatique
Tous les auteurs / collaborateurs : Audun Jøsang; Bengt Carlsson
ISBN : 9783642342103 3642342108
Numéro OCLC : 816818875
Description : 1 online resource (x, 246 p.) : ill. (some col.)
Contenu : Application security. Designed to fail: a USB-connected reader for online banking / Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, and Roel Verdult --
Security add-ons for mobile platforms / Benjamin Adolphi and Hanno Langweg --
THAPS: automated vulnerability scanning of PHP applications / Torben Jensen, Heine Pedersen, Mads Chr. Olesen, and René Rydhof Hansen --
Security management. Cyber security exercises and competitions as a platform for cyber security experiments / Teodor somestad and Jonas Hallberg --
The development of cyber security warning, advice and report points / Tony Proctor --
Towards an empirical examination of IT security infrastructures in SME / Ramona Groner and Philipp Brune --
How to select a security requirements method? A comparative study with students and practitioners / Fabio Massacci and Fedrica Paci --
System security. There is safety in numbers: preventing control-flow hijacking by duplication / Job Noorman, Nick Nikiforackis, and Frank Piessens --
coinductive unwinding of security-relevant hyperproperties / Dimiter Milshev and Dave Clarke --
Retooling and securing systematic debugging / Björn Ståhl and Per Mellstrand --
Network security. Cracking associative passwords / Kirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, and Anders Wiehe / A hybrid approach for highly available and secure storage of pseudo-SSO credentials / Jan Zibuschka and Lothar Fritsch --
Assessing the quality of packet-level traces collected on Internet backbone links / Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olobsson, and Wolfgang John --
Trust management. Everything but the kitchen sink: determining the effect of multiple attacks on privacy preservintg technology users / Jason W. Clark --
Can we identify manipulative behavior and the corresponding suspects on review websites using supervised learning? / Huiying Duan and Cäcilia Zirn --
Privacy-friendly cloud storage for the data track: an educational transparency tool / Tobias Pulls.
Titre de collection : Lecture notes in computer science, 7617.; LNCS sublibrary., SL 4,, Security and cryptology.
Responsabilité : Audun Jøsang, Bengt Carlsson (eds.).
Plus d’informations :

Résumé :

This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.

Critiques

Critiques d’utilisateurs
Récupération des critiques de GoodReads...
Récuperation des critiques DOGObooks…

Tags

Soyez le premier.
Confirmez cette demande

Vous avez peut-être déjà demandé cet ouvrage. Veuillez sélectionner OK si vous voulez poursuivre avec cette demande quand même.

Données liées


<http://www.worldcat.org/oclc/816818875>
library:oclcnum"816818875"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/816818875>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872484>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures."
schema:name"Computer security"
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:copyrightYear"2012"
schema:creator
schema:datePublished"2012"
schema:description"This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1178996391>
schema:genre"Conference proceedings."
schema:genre"Electronic books."
schema:genre"Conference proceedings"
schema:inLanguage"en"
schema:name"Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012 : proceedings"
schema:numberOfPages"246"
schema:publisher
schema:url
schema:url<http://dx.doi.org/10.1007/978-3-642-34210-3>
schema:url<http://site.ebrary.com/id/10653258>
schema:workExample

Content-negotiable representations

Fermer la fenêtre

Veuillez vous identifier dans WorldCat 

Vous n’avez pas de compte? Vous pouvez facilement créer un compte gratuit.