Normal view MARC view ISBD view

Information Systems Security [electronic resource] : 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings / edited by Somesh Jha, Anish Mathuria.

By: Jha, Somesh [editor.].
Contributor(s): Mathuria, Anish [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 6503Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Description: XIV, 261p. 60 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642177149.Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Information storage and retrieval systems | Biometrics | Information Systems | Computer Science | Computer Communication Networks | Systems and Data Security | Information Storage and Retrieval | Management of Computing and Information Systems | Biometrics | Data EncryptionDDC classification: 004.6 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue