|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-11379-1 |
003 |
DE-He213 |
005 |
20220115071735.0 |
007 |
cr nn 008mamaa |
008 |
140820s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319113791
|9 978-3-319-11379-1
|
024 |
7 |
|
|a 10.1007/978-3-319-11379-1
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Research in Attacks, Intrusions and Defenses
|h [electronic resource] :
|b 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings /
|c edited by Angelos Stavrou, Herbert Bos, Georgios Portokalidis.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIV, 490 p. 114 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8688
|
505 |
0 |
|
|a Computer security.- Network security -- Authentication -- Malware -- Intrusion detection -- Browser security -- Web application security -- Wireless security -- Vulnerability analysis.
|
520 |
|
|
|a This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Stavrou, Angelos.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bos, Herbert.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Portokalidis, Georgios.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319113807
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319113784
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8688
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-11379-1
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|