Amazon cover image
Image from Amazon.com

Applications and Techniques in Information Security [electronic resource] : 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings / edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren.

By: Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 490Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014Description: XII, 266 p. 120 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783662456705
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
E-Book E-Book Central Library Available E-51350

Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations.

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.

There are no comments on this title.

to post a comment.

Maintained by VTU Library