|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-23644-0 |
003 |
DE-He213 |
005 |
20220115080953.0 |
007 |
cr nn 008mamaa |
008 |
120211s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642236440
|9 978-3-642-23644-0
|
024 |
7 |
|
|a 10.1007/978-3-642-23644-0
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Recent Advances in Intrusion Detection
|h [electronic resource] :
|b 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011, Proceedings /
|c edited by Robin Sommer, Davide Balzarotti, Gregor Maier.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a X, 399 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6961
|
520 |
|
|
|a This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
700 |
1 |
|
|a Sommer, Robin.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Balzarotti, Davide.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Maier, Gregor.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642236433
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642236457
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6961
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-23644-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|