Communications and Multimedia Security Volume 3

This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in Sept...

Full description

Bibliographic Details
Other Authors: Katsikas, Sokratis (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 1997, 1997
Edition:1st ed. 1997
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 01778nmm a2200313 u 4500
001 EB001122985
003 EBX01000000000000000850280
005 00000000000000.0
007 cr|||||||||||||||||||||
008 160203 ||| eng
020 |a 9780387352565 
100 1 |a Katsikas, Sokratis  |e [editor] 
245 0 0 |a Communications and Multimedia Security  |h Elektronische Ressource  |b Volume 3  |c edited by Sokratis Katsikas 
250 |a 1st ed. 1997 
260 |a New York, NY  |b Springer US  |c 1997, 1997 
300 |a VIII, 319 p  |b online resource 
653 |a Computer Communication Networks 
653 |a Information Storage and Retrieval 
653 |a Information storage and retrieval systems 
653 |a Computer networks  
653 |a Signal, Speech and Image Processing 
653 |a Signal processing 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a IFIP Advances in Information and Communication Technology 
028 5 0 |a 10.1007/978-0-387-35256-5 
856 4 0 |u https://doi.org/10.1007/978-0-387-35256-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. The book aims to cover the subject of Communications and Multimedia Systems Security, as fully as possible. It constitutes an essential reading for information technology security specialists; computer professionals; communication systems professionals; EDP managers; EDP auditors; managers, researchers and students working on the subject