Normal view MARC view ISBD view

Information Systems Security [electronic resource] :6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings / edited by Somesh Jha, Anish Mathuria.

by Jha, Somesh [editor.]; Mathuria, Anish [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 6503Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.Description: XIV, 261p. 60 illus. online resource.ISBN: 9783642177149.Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Information storage and retrieval systems | Biometrics | Information Systems | Computer Science | Computer Communication Networks | Systems and Data Security | Information Storage and Retrieval | Management of Computing and Information Systems | Biometrics | Data EncryptionDDC classification: 004.6 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
TK5105.5-5105.9 (Browse shelf) Available

This book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha