Cargando…

Critical Information Infrastructure Security 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers /

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Xenakis, Christos (Editor ), Wolthusen, Stephen (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Edición:1st ed. 2011.
Colección:Security and Cryptology ; 6712
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-21694-7
003 DE-He213
005 20220115072201.0
007 cr nn 008mamaa
008 120210s2011 gw | s |||| 0|eng d
020 |a 9783642216947  |9 978-3-642-21694-7 
024 7 |a 10.1007/978-3-642-21694-7  |2 doi 
050 4 |a QA76.9.M3 
072 7 |a KJQ  |2 bicssc 
072 7 |a BUS083000  |2 bisacsh 
072 7 |a KJQ  |2 thema 
082 0 4 |a 004.068  |2 23 
245 1 0 |a Critical Information Infrastructure Security  |h [electronic resource] :  |b 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers /  |c edited by Christos Xenakis, Stephen Wolthusen. 
250 |a 1st ed. 2011. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2011. 
300 |a X, 161 p. 54 illus., 33 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 6712 
520 |a This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data. 
650 0 |a Electronic data processing-Management. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers. 
650 0 |a Computer networks . 
650 0 |a Computers, Special purpose. 
650 0 |a Electronic digital computers-Evaluation. 
650 1 4 |a IT Operations. 
650 2 4 |a Cryptology. 
650 2 4 |a Hardware Performance and Reliability. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Special Purpose and Application-Based Systems. 
650 2 4 |a System Performance and Evaluation. 
700 1 |a Xenakis, Christos.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wolthusen, Stephen.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642216930 
776 0 8 |i Printed edition:  |z 9783642216954 
830 0 |a Security and Cryptology ;  |v 6712 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-21694-7  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)