Atjaunināt sīkdatņu piekrišanu

Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 1719, 2021, Proceedings 1st ed. 2021 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 394 pages, height x width: 235x155 mm, weight: 629 g, 50 Illustrations, color; 10 Illustrations, black and white; XIII, 394 p. 60 illus., 50 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13107
  • Izdošanas datums: 17-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030932052
  • ISBN-13: 9783030932053
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 69,22 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 81,44 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 394 pages, height x width: 235x155 mm, weight: 629 g, 50 Illustrations, color; 10 Illustrations, black and white; XIII, 394 p. 60 illus., 50 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13107
  • Izdošanas datums: 17-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030932052
  • ISBN-13: 9783030932053
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021.





The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Cryptology.- Applied cryptography.- Mobile security.- Cloud security.- Access control.- Privacy enhanced technology.- Viruses and malware.- Software security.-Database security.- Web security.- Operating system security.- Intrusion detection.- Big data security and privacy.- Biometric Security.