Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World

Security of Networks and Services in an All-Connected World

11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings

Daphne Tuncer and Others

Publisher Description

​This book is open access under a CC BY 4.0 license.

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.
The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions.  The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.

GENRE
Computing & Internet
RELEASED
2017
29 June
LANGUAGE
EN
English
LENGTH
212
Pages
PUBLISHER
Springer International Publishing
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
3.4
MB
Cyber Security Cyber Security
2021
Cyber Security Cyber Security
2019
Security in Computer and Information Sciences Security in Computer and Information Sciences
2018
Cyber Security Cyber Security
2022
CISSP All-in-One Exam Guide, Seventh Edition CISSP All-in-One Exam Guide, Seventh Edition
2016
CISSP All-in-One Exam Guide, Ninth Edition CISSP All-in-One Exam Guide, Ninth Edition
2021
Security in Computer and Information Sciences Security in Computer and Information Sciences
2018
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
The InfoSec Handbook The InfoSec Handbook
2014
Transport Layer Transport Layer
2015
Hacked?! Hacked?!
2015
The State of Risk-Based Security Management The State of Risk-Based Security Management
2012