|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-85555-4 |
003 |
DE-He213 |
005 |
20220113175208.0 |
007 |
cr nn 008mamaa |
008 |
100608s2009 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387855554
|9 978-0-387-85555-4
|
024 |
7 |
|
|a 10.1007/978-0-387-85555-4
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Proceedings of the 3rd European Conference on Computer Network Defense
|h [electronic resource] /
|c edited by Vasilios Siris, Sotiris Ioannidis, Kostas Anagnostakis, Panagiotis Trimintzios.
|
250 |
|
|
|a 1st ed. 2009.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a X, 166 p. 25 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1119 ;
|v 30
|
505 |
0 |
|
|a Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting -- Towards High Assurance Networks of Virtual Machines -- Intrusion Detection Using Cost-Sensitive Classification -- A Novel Approach for Anomaly Detection over High-Speed Networks -- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption -- Vulnerability Response Decision Assistance -- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests -- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat -- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction -- ISi-LANA - A Secure Basic Architecture for Networks Connected to the Internet.
|
520 |
|
|
|a Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Electronics.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Electronics and Microelectronics, Instrumentation.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Hardware Performance and Reliability.
|
700 |
1 |
|
|a Siris, Vasilios.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ioannidis, Sotiris.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Anagnostakis, Kostas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Trimintzios, Panagiotis.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387856124
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441946676
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387855547
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1119 ;
|v 30
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-85555-4
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|