Atjaunināt sīkdatņu piekrišanu

Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 1620, 2019, Proceedings 2019 ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 345 pages, height x width: 235x155 mm, weight: 557 g, 45 Illustrations, color; 144 Illustrations, black and white; XVIII, 345 p. 189 illus., 45 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11952
  • Izdošanas datums: 03-Dec-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030369447
  • ISBN-13: 9783030369446
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 345 pages, height x width: 235x155 mm, weight: 557 g, 45 Illustrations, color; 144 Illustrations, black and white; XVIII, 345 p. 189 illus., 45 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11952
  • Izdošanas datums: 03-Dec-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030369447
  • ISBN-13: 9783030369446

This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019.
The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions.
The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography.

Smart contracts.- Formal techniques.- Access control.- Machine learning.- Distributed systems.- Cryptography.- Online social networks.- Images and cryptography.