|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-47560-8 |
003 |
DE-He213 |
005 |
20220115062358.0 |
007 |
cr nn 008mamaa |
008 |
161008s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319475608
|9 978-3-319-47560-8
|
024 |
7 |
|
|a 10.1007/978-3-319-47560-8
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Secure IT Systems
|h [electronic resource] :
|b 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings /
|c edited by Billy Bob Brumley, Juha Röning.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a X, 269 p. 43 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10014
|
505 |
0 |
|
|a Security -- System Security -- Network Security -- Software Security -- Cryptography -- Authentication.
|
520 |
|
|
|a This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016. The 16 full papers presented in this volume were carefully reviewed and selected from 43 submissions. The focus of the conference is on following topics: Security, System Security, Network Security, Software Security, and Information Security.<data security, mobile="" security, security="" protocols, risk="" management, security="" models,="" and vulnerability="" management.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Biometric identification.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Brumley, Billy Bob.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Röning, Juha.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319475592
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319475615
|
830 |
|
0 |
|a Security and Cryptology ;
|v 10014
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-47560-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|