Security and Management and Wireless Networks (Paperback)
Kevin Daimi
Sold by Grand Eagle Retail, Bensenville, IL, U.S.A.
AbeBooks Seller since October 12, 2005
New - Soft cover
Condition: New
Quantity: 1 available
Add to basketSold by Grand Eagle Retail, Bensenville, IL, U.S.A.
AbeBooks Seller since October 12, 2005
Condition: New
Quantity: 1 available
Add to basketPaperback. This book constitutes the proceedings of the 23rd International Conference on Security and Management, SAM 2024, and the 23rd International Conference on Wireless Networks, ICWN 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.For SAM 2024, 255 submissions have been received and 40 papers have been accepted for publication in these proceedings; the 12 papers included from IWCN 2024 have been carefully reviewed and selected from 66 submissions. They have been organized in topical sections as follows: Intrusion and attack detection: malware, malicious URL, phishing; security assessment and management + blockchain + use of artificial intelligence; cybersecurity and communications systems + cryptography and privacy; security and management + new methodologies and applications; wireless networks and mobile computing. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller Inventory # 9783031866364
This book constitutes the proceedings of the 23rd International Conference on Security and Management, SAM 2024, and the 23rd International Conference on Wireless Networks, ICWN 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.
For SAM 2024, 255 submissions have been received and 40 papers have been accepted for publication in these proceedings; the 12 papers included from IWCN 2024 have been carefully reviewed and selected from 66 submissions. They have been organized in topical sections as follows: Intrusion and attack detection: malware, malicious URL, phishing; security assessment and management + blockchain + use of artificial intelligence; cybersecurity and communications systems + cryptography and privacy; security and management + new methodologies and applications; wireless networks and mobile computing.
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it¿s described on the Abebooks web sites. If you¿ve changed
your mind about a book that you¿ve ordered, please use the Ask bookseller a question link to contact us
and we¿ll respond within 2 business days.
Books ship from California and Michigan.
Orders usually ship within 2 business days. All books within the US ship free of charge. Delivery is 4-14 business days anywhere in the United States.
Books ship from California and Michigan.
If your book order is heavy or oversized, we may contact you to let you know extra shipping is required.
| Order quantity | 6 to 16 business days | 6 to 14 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.