000780357 000__ 03337cam\a2200577Ii\4500 000780357 001__ 780357 000780357 005__ 20230306143005.0 000780357 006__ m\\\\\o\\d\\\\\\\\ 000780357 007__ cr\nn\nnnunnun 000780357 008__ 170324s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000780357 019__ $$a981881371$$a981972613$$a982017492$$a984875867 000780357 020__ $$a9783319543802$$q(electronic book) 000780357 020__ $$a3319543806$$q(electronic book) 000780357 020__ $$z9783319543796 000780357 020__ $$z3319543792 000780357 0247_ $$a10.1007/978-3-319-54380-2$$2doi 000780357 035__ $$aSP(OCoLC)ocn978347500 000780357 035__ $$aSP(OCoLC)978347500$$z(OCoLC)981881371$$z(OCoLC)981972613$$z(OCoLC)982017492$$z(OCoLC)984875867 000780357 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dUAB$$dNJR$$dIOG$$dAZU$$dUPM$$dOCLCO 000780357 049__ $$aISEA 000780357 050_4 $$aQA76.9.A25 000780357 08204 $$a005.8$$223 000780357 1112_ $$aES (Workshop)$$n(2nd :$$d2015 :$$cVancouver, B.C.) 000780357 24510 $$aEnterprise security :$$bsecond International Workshop, ES 2015, Vancouver, BC, Canada, November 30-December 3, 2015, Revised selected papers /$$cVictor Chang, Muthu Ramachandran, Robert J. Walters, Gary Wills (eds.). 000780357 2463_ $$aES 2015 000780357 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000780357 300__ $$a1 online resource (x, 277 pages) :$$billustrations. 000780357 336__ $$atext$$btxt$$2rdacontent 000780357 337__ $$acomputer$$bc$$2rdamedia 000780357 338__ $$aonline resource$$bcr$$2rdacarrier 000780357 347__ $$atext file$$bPDF$$2rda 000780357 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10131 000780357 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000780357 5050_ $$aChallenges of Cloud Forensics -- Iris Biometrics Recognition in Security Management -- An Approach to Organizational Cybersecurity -- Protecting Document Outside Enterprise Network. 000780357 506__ $$aAccess limited to authorized users. 000780357 520__ $$aEnterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015. The 11 papers were selected from 24 submissions and provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics. 000780357 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 24, 2017). 000780357 650_0 $$aComputer security$$vCongresses. 000780357 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000780357 650_0 $$aCloud computing$$xSecurity measures$$vCongresses. 000780357 7001_ $$aChang, Victor,$$d1976-$$eeditor. 000780357 7001_ $$aRamachandran, Muthu,$$eeditor. 000780357 7001_ $$aWalters, Robert John,$$d1958-$$eeditor. 000780357 7001_ $$aWills, Gary,$$d1962-$$eeditor. 000780357 77608 $$iPrint version:$$z3319543792$$z9783319543796$$w(OCoLC)971232117 000780357 830_0 $$aLecture notes in computer science ;$$v10131. 000780357 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000780357 852__ $$bebk 000780357 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-54380-2$$zOnline Access$$91397441.1 000780357 909CO $$ooai:library.usi.edu:780357$$pGLOBAL_SET 000780357 980__ $$aEBOOK 000780357 980__ $$aBIB 000780357 982__ $$aEbook 000780357 983__ $$aOnline 000780357 994__ $$a92$$bISE