000753357 000__ 02930cam\a2200529Ii\4500 000753357 001__ 753357 000753357 005__ 20230306141554.0 000753357 006__ m\\\\\o\\d\\\\\\\\ 000753357 007__ cr\cn\nnnunnun 000753357 008__ 160115s2016\\\\sz\a\\\\o\\\\\101\0\eng\d 000753357 020__ $$a9783319283135$$q(electronic book) 000753357 020__ $$a3319283138$$q(electronic book) 000753357 020__ $$z9783319283128 000753357 0247_ $$a10.1007/978-3-319-28313-5$$2doi 000753357 035__ $$aSP(OCoLC)ocn934813621 000753357 035__ $$aSP(OCoLC)934813621 000753357 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dOCLCF$$dOCLCO$$dAZU$$dCOO$$dOCLCQ 000753357 049__ $$aISEA 000753357 050_4 $$aQA76.9.A25 000753357 08204 $$a005.8$$223 000753357 1112_ $$aCybersecurity Symposium$$n(2nd :$$d2015 :$$cCoeur d'Alene, Idaho) 000753357 24510 $$aCyber security$$h[electronic resource] :$$bsecond International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised selected papers /$$cKristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song (eds.). 000753357 2463_ $$aCSS 2015 000753357 264_1 $$aCham :$$bSpringer,$$c2016. 000753357 300__ $$a1 online resource (ix, 143 pages) :$$bcolor illustrations. 000753357 336__ $$atext$$btxt$$2rdacontent 000753357 337__ $$acomputer$$bc$$2rdamedia 000753357 338__ $$aonline resource$$bcr$$2rdacarrier 000753357 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v589 000753357 500__ $$aIncludes author index. 000753357 5050_ $$aPermissions and trust evaluation, implementation and management -- Cloud and device security and privacy -- Social implications of networked and mobile applications.-System and process assessments for improved cybersecurity. 000753357 506__ $$aAccess limited to authorized users. 000753357 520__ $$aThis book constitutes the refereed proceedings of the Second International Symposium on Cyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015. The 9 revised full papers presented were carefully reviewed and selected from 20 papers. The papers reflect four areas of scholarly work: permissions and trust evaluation, implementation and management; cloud and device security and privacy; social implications of networked and mobile applications; system and process assessments for improved cybersecurity. 000753357 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 15, 2016). 000753357 650_0 $$aComputer security$$vCongresses. 000753357 7001_ $$aHaltinner, Kristin,$$eeditor. 000753357 7001_ $$aSarathchandra, Dilshani,$$eeditor. 000753357 7001_ $$aAlves-Foss, James,$$d1964-$$eeditor. 000753357 7001_ $$aChang, Kevin,$$eeditor. 000753357 7001_ $$aConte de Leon, Daniel F.$$q(Daniel Francisco),$$eeditor. 000753357 7001_ $$aSong, Jia,$$eeditor. 000753357 77608 $$iPrint version:$$z9783319283128 000753357 830_0 $$aCommunications in computer and information science ;$$v589. 000753357 852__ $$bebk 000753357 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-28313-5$$zOnline Access$$91397441.1 000753357 909CO $$ooai:library.usi.edu:753357$$pGLOBAL_SET 000753357 980__ $$aEBOOK 000753357 980__ $$aBIB 000753357 982__ $$aEbook 000753357 983__ $$aOnline 000753357 994__ $$a92$$bISE