logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Secure It Systems 25th Nordic Conference Nordsec 2020 Virtual Event November 2324 2020 Proceedings 1st Ed 2021 Mikael Asplund

  • SKU: BELL-23654912
Secure It Systems 25th Nordic Conference Nordsec 2020 Virtual Event November 2324 2020 Proceedings 1st Ed 2021 Mikael Asplund
$ 31.00 $ 45.00 (-31%)

4.8

64 reviews

Secure It Systems 25th Nordic Conference Nordsec 2020 Virtual Event November 2324 2020 Proceedings 1st Ed 2021 Mikael Asplund instant download after payment.

Publisher: Springer
File Extension: EPUB
File size: 18.14 MB
Author: Mikael Asplund, Simin Nadjm-Tehrani
ISBN: 9783030708528, 3030708527
Language: English
Year: 2021
Edition: 1st ed. 2021

Product desciption

Secure It Systems 25th Nordic Conference Nordsec 2020 Virtual Event November 2324 2020 Proceedings 1st Ed 2021 Mikael Asplund by Mikael Asplund, Simin Nadjm-tehrani 9783030708528, 3030708527 instant download after payment.

This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020.

The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.

Related Products