
books.apple.com/us/book/information-and-communications-security/id1542544603
Preview meta tags from the books.apple.com website.
Linked Hostnames
4- 20 links towww.apple.com
- 10 links tobooks.apple.com
- 1 link tolocate.apple.com
- 1 link tosupport.apple.com
Thumbnail

Search Engine Appearance
Information and Communications Security
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about
…
Bing
Information and Communications Security
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about
…
DuckDuckGo

Information and Communications Security
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about
…
General Meta Tags
14- titleInformation and Communications Security by Weizhi Meng, Dieter Gollmann, Christian D. Jensen & Jianying Zhou on Apple Books
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1, viewport-fit=cover
- applicable-devicepc,mobile
Open Graph Meta Tags
12- og:titleInformation and Communications Security
- og:descriptionComputers & Internet · 2020
- og:site_nameApple Books
- og:urlhttps://books.apple.com/us/book/information-and-communications-security/id1542544603
- og:imagehttps://is1-ssl.mzstatic.com/image/thumb/Publication114/v4/d6/52/61/d652618c-ce14-e82f-6b84-968592f6aba2/cover.jpg/1200x630wz.png
Twitter Meta Tags
6- twitter:titleInformation and Communications Security
- twitter:descriptionComputers & Internet · 2020
- twitter:site@AppleBooks
- twitter:cardsummary_large_image
- twitter:imagehttps://is1-ssl.mzstatic.com/image/thumb/Publication114/v4/d6/52/61/d652618c-ce14-e82f-6b84-968592f6aba2/cover.jpg/1200x600wz.png
Link Tags
15- canonicalhttps://books.apple.com/us/book/information-and-communications-security/id1542544603
- iconhttps://books.apple.com/assets/images/favicon/favicon-books-48-a8eb8171a8d912ed29d99e7a134953d3.png
- preconnecthttps://amp-api.books.apple.com
- preconnecthttps://is1-ssl.mzstatic.com
- preconnecthttps://is2-ssl.mzstatic.com
Links
32- https://books.apple.com/us/author/weizhi-meng/id1180129856
- https://books.apple.com/us/book/attacks-and-defenses-for-the-internet-of-things/id6743181203
- https://books.apple.com/us/book/botnets/id1568135226
- https://books.apple.com/us/book/information-and-communications-security/id1542544603?see-all=author-other-books
- https://books.apple.com/us/book/neural-computing-for-advanced-applications/id6708225089