Descripción del título
This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services
Monografía
monografia Rebiun23897493 https://catalogo.rebiun.org/rebiun/record/Rebiun23897493 190704s2019 gw s 00 0 eng d 9783030251093 9783030251086 9783030251109 UMA.RE Information Systems Security and Privacy Recurso electrónico] :] 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers edited by Paolo Mori, Steven Furnell, Olivier Camp 1st ed. 2019 Cham Springer International Publishing 2019 Cham Cham Springer International Publishing XII, 303 p. 137 il., 75 il. col XII, 303 p. 137 il., 75 il. col Text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Communications in Computer and Information Science 977 This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services Computer security Information systems Computer network architectures Computer networks- Security measures Computer science Data encryption (Computer science) Systems and Data Security Information Systems and Communication Service Computer Systems Organization and Communication Networks Mobile and Network Security Computing Milieux Cryptology Mori, Paolo ed. lit Furnell, Steven ed. lit Camp, Olivier ed. lit