All Systems and Data Security Titles
Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented ...
Information Security and Cryptology
Dongdai Lin, Shouhuai Xu, Moti Yung
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in Novemb ...
Information Security and Cryptology -- ICISC 2013
Hyang-Sook Lee, Dong-Guk Han
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013 ...
Information Security and Privacy
Willy Susilo, Yi Mu
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 ...
Information Security Applications
Yongdae Kim, Heejo Lee, Adrian Perrig
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised ...
Information Security Practice and Experience
Xinyi Huang, Jianying Zhou
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in t ...
Insider Attack and Cyber Security
Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The book includes chapters by world renowned experts in this field.
Insider Threats in Cyber Security
Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop
Covering every angle of the subject, this is a cutting-edge text presenting IT and non-IT facets of insider threats together. The volume gathers a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview.
Intelligence and Security Informatics
Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, th ...
Intrusion Detection Systems
Roberto Di Pietro, Luigi V. Mancini
This carefully written book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks, and covers much more.