Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings. Part I / Mirosław Kutyłowski, Jaideep Vaidya (eds.).
2014
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings. Part I / Mirosław Kutyłowski, Jaideep Vaidya (eds.).
ISBN
9783319112039 (electronic book)
3319112031 (electronic book)
9783319112022
3319112031 (electronic book)
9783319112022
Published
Cham : Springer, 2014.
Language
English
Description
1 online resource (xvi, 545 pages) : illustrations.
Item Number
10.1007/978-3-319-11203-9 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed August 27, 2014).
Series
Lecture notes in computer science ; 8712.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print verson: 9783319112022
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Cryptography, formal methods and theory of security
Security services
Intrusion/anomaly detection and malware mitigation
Security in hardware
Systems security
Network security
Database and storage security
Software and application security
Human and societal aspects of security and privacy.
Security services
Intrusion/anomaly detection and malware mitigation
Security in hardware
Systems security
Network security
Database and storage security
Software and application security
Human and societal aspects of security and privacy.