You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019. The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions. The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography.
This book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018. The 16 full papers, 1 short paper, 1 position paper and 2 invited papers presented in this book, were carefully reviewed and selected from 51 submissions. They cover a range of topics including mobile security; cloud security and big data; IoT security; software security, malware analysis, and vulnerability detection; cryptography; cyber physical security and hardware security; and access control.
As the first major post-colonial constitution, the Indian Constitution holds particular importance for the study of constitutional law and constitutions. Providing a thorough historical and political grounding, this Handbook examines key debates and developments in Indian constitutionalism and creates a framework for further study.
This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.
With the intriguing development of technologies in several industries, along with the advent of ubiquitous computational resources, there are now ample opportunities to develop innovative computational technologies in order to solve a wide range of issues concerning uncertainty, imprecision, and vagueness in various real-life problems. The challenge of blending modern computational techniques with traditional computing methods has inspired researchers and academics alike to focus on developing innovative computational techniques. In the near future, computational techniques may provide vital solutions by effectively using evolving technologies such as computer vision, natural language proces...
The quest for justice is an eternal human instinct. Human beings have aspired for it for generations. The organization (the employer) and the employee try to resolve the dispute / difference though mutual efforts, and when they are not in a position to arrive at a solution. They take recourse to law. In India, justice is mandate of the Constitution. Part XIV of the Constitution of India deals with the law pertaining to Service. Service Law is a part of administrative law. The science or philosophy of this branch of Law is called as Service jurisprudence. The news like “case drags for 42 years, Supreme Court shocked” allured and stimulated the researcher take up the present problem, for a...
This comprehensive and well-organised text, now in its Fifth Edition, explains, with great clarity and precision, the labour and industrial laws such as the Industrial Disputes Act, the Factories Act, and the Contract Labour Act. While giving a broad perspective of the subject, the text brings out the objectives behind the enactment of every legislation, discusses the relevant case laws, recent important decisions of the Apex Court and shows how the Constitution is related to labour laws. Formulas for the calculation of compensation for retrenchment, death, permanent disablement are also provided. Legal jargon has been completely avoided so that anyone who is not an expert on this particular...
This book constitutes the proceedings of the 14th International Conference on Distributed Computing and Internet Technology, ICDCIT 2018, held in Bhubaneswar, India, in January 2018. The 9 full papers, 11 short papers and 3 poster papers presented in this book were carefully reviewed and selected from 120 submissions. The ICDCIT conference focusses on security and privacy; distributed and multiprocessing approaches; networks protocols and applications; and databases, algorithms, data processing and applications.
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.