|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-11212-1 |
003 |
DE-He213 |
005 |
20220112234502.0 |
007 |
cr nn 008mamaa |
008 |
140814s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319112121
|9 978-3-319-11212-1
|
024 |
7 |
|
|a 10.1007/978-3-319-11212-1
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Computer Security - ESORICS 2014
|h [electronic resource] :
|b 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II /
|c edited by Miroslaw Kutylowski, Jaideep Vaidya.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XVI, 516 p. 106 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8713
|
505 |
0 |
|
|a Cryptography, formal methods and theory of security -- Security services -- Intrusion/anomaly detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database and storage security -- Software and application security -- Human and societal aspects of security and privacy.
|
520 |
|
|
|a The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Kutylowski, Miroslaw.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Vaidya, Jaideep.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319112138
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319112114
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8713
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-11212-1
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|