You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.
This book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017. The 21 full papers and 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on access control, privacy, cloud security, secure storage in the cloud, secure systems, and security in networks and Web.
About the Book FIRST PUBLISHED IN MARATHI IN 1998, THE NOVEL HAS BEEN TRANSLATED INTO FOURTEEN INDIAN AND FOREIGN LANGUAGES. This iconic Marathi novel by Vishwas Patil brings originality and new ideas to the most storied of lives—Subhas Chandra Bose. Possibly the most enigmatic figure in the history of India’s freedom struggle, Bose’s ideological differences with the two stalwarts of the Independence movement, Gandhi and Nehru, split the Congress down the middle. And yet he held them in high esteem, just as they admired him. While Bose asserted the independence of his own values even as he sought help from the Axis powers—Nazi Germany, Italy and later Japan—during World War II, for...
None
About the Book A MASSIVE BESTSELLER THAT HAS SOLD OVER 1,00,000 COPIES IN MARATHI. Even as a child, Sambhaji has known he must stand alone. His mother died when he was barely two, and his father was always absent—chasing his own dream of ‘Swaraj’, fighting to keep the Mughal emperor Aurangzeb at bay. As the eldest son, Sambhaji is the true heir to Shivaji. He is valorous, wise and has the makings of a capable statesman. But there are dark forces at play in the palace. Shivaji’s other queen, Soyrabai, is scheming to place her son Rajaram on the throne, and she has the support of several ministers whose misdemeanours Sambhaji is determined to expose. On 3 April 1680, Shivaji dies unexp...
Translated from Marathi.
None
This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc