|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-22424-9 |
003 |
DE-He213 |
005 |
20220115074559.0 |
007 |
cr nn 008mamaa |
008 |
110620s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642224249
|9 978-3-642-22424-9
|
024 |
7 |
|
|a 10.1007/978-3-642-22424-9
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Detection of Intrusions and Malware, and Vulnerability Assessment
|h [electronic resource] :
|b 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings /
|c edited by Thorsten Holz, Herbert Bos.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a X, 235 p. 86 illus., 44 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6739
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Holz, Thorsten.
|e editor.
|0 (orcid)0000-0002-2783-1264
|1 https://orcid.org/0000-0002-2783-1264
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bos, Herbert.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642224232
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642224256
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6739
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-22424-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|