Free shipping on orders over $99
Applications and Techniques in Information Security

Applications and Techniques in Information Security

9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings

by Lynn BattenGang Li Qingfeng Chen and others
Paperback
Publication Date: 28/12/2018

Share This Book:

  $84.99
or 4 easy payments of $21.25 with
afterpay
This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.



The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
ISBN:
9789811329067
9789811329067
Category:
Computer security
Format:
Paperback
Publication Date:
28-12-2018
Publisher:
Springer Verlag, Singapore
Country of origin:
Singapore
Pages:
223
Dimensions (mm):
235x155mm
Weight:
0.45kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Applications and Techniques in Information Security.