10% off all books and free delivery over £40
Buy from our bookstore and 25% of the cover price will be given to a school of your choice to buy more books. *15% of eBooks.

Security Technology, Disaster Recovery and Business Continuity

View All Editions (1)

The selected edition of this book is not available to buy right now.
Add To Wishlist
Write A Review

About

Security Technology, Disaster Recovery and Business Continuity Synopsis

Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 papers submitted to SecTech/DRBC 2010. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were accepted for FGIT 2010, while 57 papers were accepted for SecTech/DRBC 2010. Of the 250 papers 10 were selected for the special FGIT 2010 volume published by Springer in the LNCS series. 34 papers are published in this volume, and 13 papers were wi- drawn due to technical reasons. We would like to acknowledge the great effort of the SecTech/DRBC 2010 Int- national Advisory Boards and members of the International Program Committees, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of these two conferences would not have been possible without the huge support from our sponsors and the work of the Chairs and Organizing Committee.

About This Edition

ISBN: 9783642176098
Publication date:
Author: Waichi Fang, Muhammad Khurram Khan, Kirk P Arnett, Heaujo Kang, Dominik Slezak
Publisher: Springer an imprint of Springer Berlin Heidelberg
Format: Paperback
Pagination: 300 pages
Series: Communications in Computer and Information Science
Genres: Network hardware
Algorithms and data structures
Data encryption
Coding theory and cryptology
Business mathematics and systems
Digital and information technologies: social and ethical aspects
Applied computing