|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocm71202776 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
060829s2006 ne a ob 101 0 eng d |
010 |
|
|
|a 2005937976
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d CUZ
|d TXR
|d IOSPR
|d IDEBK
|d OCLCE
|d E7B
|d OCLCQ
|d TUU
|d OCLCQ
|d OCLCO
|d FVL
|d OCLCQ
|d YDXCP
|d OCLCO
|d OCLCQ
|d EBLCP
|d DEBSZ
|d OCLCO
|d OCLCQ
|d OCLCO
|d AZK
|d JBG
|d MOR
|d PIFAG
|d ZCU
|d MERUC
|d HTC
|d OCLCQ
|d WY@
|d OCLCA
|d LUE
|d OCLCF
|d BRL
|d STF
|d WRM
|d VTS
|d NRAMU
|d ICG
|d OCLCQ
|d VT2
|d OCLCQ
|d WYU
|d A6Q
|d DKC
|d OCLCQ
|d UKCRE
|d OCLCO
|d OCLCQ
|d OCLCO
|d INARC
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 320320155
|a 491259661
|a 606209057
|a 607734046
|a 614526035
|a 722472579
|a 728036782
|a 961587520
|a 962659329
|a 988462065
|a 992028536
|a 1037509145
|a 1038635607
|a 1045514923
|a 1055384427
|a 1066604507
|a 1076290986
|a 1081221050
|a 1153461862
|a 1228532039
|a 1330619543
|a 1407444025
|
020 |
|
|
|a 1423797329
|q (electronic bk.)
|
020 |
|
|
|a 9781423797326
|q (electronic bk.)
|
020 |
|
|
|a 9781607501558
|
020 |
|
|
|a 1607501554
|
020 |
|
|
|z 1586035800
|
020 |
|
|
|z 9781586035808
|
029 |
1 |
|
|a AU@
|b 000046686655
|
029 |
1 |
|
|a AU@
|b 000051410827
|
029 |
1 |
|
|a DEBBG
|b BV043109498
|
029 |
1 |
|
|a DEBBG
|b BV044083690
|
029 |
1 |
|
|a DEBSZ
|b 422265772
|
029 |
1 |
|
|a DEBSZ
|b 456420460
|
029 |
1 |
|
|a NZ1
|b 14236299
|
035 |
|
|
|a (OCoLC)71202776
|z (OCoLC)320320155
|z (OCoLC)491259661
|z (OCoLC)606209057
|z (OCoLC)607734046
|z (OCoLC)614526035
|z (OCoLC)722472579
|z (OCoLC)728036782
|z (OCoLC)961587520
|z (OCoLC)962659329
|z (OCoLC)988462065
|z (OCoLC)992028536
|z (OCoLC)1037509145
|z (OCoLC)1038635607
|z (OCoLC)1045514923
|z (OCoLC)1055384427
|z (OCoLC)1066604507
|z (OCoLC)1076290986
|z (OCoLC)1081221050
|z (OCoLC)1153461862
|z (OCoLC)1228532039
|z (OCoLC)1330619543
|z (OCoLC)1407444025
|
037 |
|
|
|a 978-1-58603-580-8
|b IOS Press
|n http://www.iospress.nl
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK7895.E42
|b N27 2005eb
|
072 |
|
7 |
|a COM
|x COM014000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.16
|2 22
|
049 |
|
|
|a UAMI
|
111 |
2 |
|
|a NATO Advanced Research Workshop on Security and Embedded Systems
|d (2005 Aug. 22-26 :
|c Patras, Greece)
|
245 |
1 |
0 |
|a Security and embedded systems /
|c edited by Dimitrios N. Serpanos and Ran Giladi.
|
260 |
|
|
|a Amsterdam ;
|a Washington, D.C. :
|b IOS Press,
|c ©2006.
|
300 |
|
|
|a 1 online resource (xii, 203 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
490 |
1 |
|
|a NATO security through science series. D : Information and communication security ;
|v vol. 2
|
500 |
|
|
|a Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems."
|
504 |
|
|
|a Includes bibliographical references and author index.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
505 |
0 |
0 |
|t Chaotic routing as a method of an information conversion /
|r Y.P. Shankin --
|t Combinatorial game models for security systems /
|r Edward Pogossian --
|t Architectural enhancements for secure embedded processing /
|r Divya Arora, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha --
|t Computational improvements to differential side channel analysis /
|r David Nacache, Michael Tunstall and Claire Whelan --
|t A process algebra approach to authentication and secrecy /
|r Lacramioara Astefanoaei and Gabriel Ciobanu --
|t Intellectual property protection using embedded systems /
|r A.G. Fragopoulos and D.N. Serpanos --
|t Challenges in deeply networked system survivability /
|r Philip Koopman, Jennifer Morris and Priya Narasimhan --
|t Multimedia watermarking /
|r Bede Liu --
|t A platform for designing secure embedded systems /
|r Haris Lekatsas, Jorg Henkel, Venkata Jakkula and Srimat Chakradhar --
|t Cryptographic insecurity of the test & repeat paradigm /
|r Tomas Rosa --
|t A privacy classification model based on linkability valuation /
|r Dan Cvrcek, Vashek Matyas and Marek Kumpost --
|t A run-time reconfigurable architecture for embedded program flow verification /
|r Joseph Zambreno, Tanathil Anish and Alok Choudhary --
|t Model-based validation of enterprise access policies /
|r Sandeep Bhatt, William Horne, Joe Pato, Raj Rajagopalan and Prasad Rao --
|t Research issues in homeland security /
|r Theodoros Zachariadis --
|t Assurance in autonomous decentralized embedded system /
|r Kinji Mori.
|
505 |
8 |
0 |
|t Vulnerabilities and countermeasures for embedded processors /
|r Shengqi Yang, Wayne Wolf, N. Vijakrishnan, Yuan Xie and Dimitrios Serpanos --
|t Agent-based modeling and simulation of malefactors' attacks against computer networks /
|r Igor Kotenko, Mihail Stepashkin and Alexander Ulanov --
|t Current problems in security of military networks /
|r Jaroslav Dockal and Pavel Pokorny --
|t Multi-agent framework for intrusion detection and alert correlation /
|r Vladimir Gorodetsky, Oleg Karsaev, Valdimir Samoilov and Alexander Ulanov --
|t Securing home and building automation systems using the zPnP approach /
|r Ran Giladi --
|t REWARD : a routing method for ad-hoc networks with adjustable security capability /
|r Zdravko Karakehayov and Ivan Radev --
|t On the security of the GSM cellular network /
|r Elad Barkan and Eli Biham --
|t Telecommunications fraud & electronic crime in fix and mobile embedded systems /
|r Michalis Mavis.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Embedded computer systems
|x Security measures
|v Congresses.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
6 |
|a Systèmes enfouis (Informatique)
|x Sécurité
|x Mesures
|v Congrès.
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès.
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x Personal Computers
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x Handheld Devices.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Microprocessors.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Giladi, Ran.
|
700 |
1 |
|
|a Serpanos, Dimitrios Nikolaou.
|
758 |
|
|
|i has work:
|a Security and embedded systems (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGVHGFfwvYFr8p9ckdh8RX
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a NATO Advanced Research Workshop on Security and Embedded Systems (2005 Aug. 22-26 : Patras, Greece).
|t Security and embedded systems.
|d Amsterdam ; Washington, D.C. : IOS Press, ©2006
|z 1586035800
|w (DLC) 2005937976
|w (OCoLC)65638157
|
830 |
|
0 |
|a NATO security through science series.
|n D,
|p Information and communication security ;
|v vol. 2.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=265974
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL265974
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10130650
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 164050
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2468026
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3207172
|
938 |
|
|
|a Internet Archive
|b INAR
|n securityembedded0000unse
|
994 |
|
|
|a 92
|b IZTAP
|