|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn437213124 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr mn|---||||| |
008 |
090817s2008 ne o 000 0 eng d |
040 |
|
|
|a MERUC
|b eng
|e pn
|c MERUC
|d EBLCP
|d OCLCQ
|d YDXCP
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d U3W
|d OCLCO
|d OCLCA
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCA
|d ICG
|d INT
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 476162632
|
020 |
|
|
|a 9781433712333
|q (electronic bk.)
|
020 |
|
|
|a 1433712334
|q (electronic bk.)
|
020 |
|
|
|a 9781607503156
|
020 |
|
|
|a 1607503158
|
029 |
1 |
|
|a DEBBG
|b BV044129764
|
029 |
1 |
|
|a DEBSZ
|b 430489064
|
035 |
|
|
|a (OCoLC)437213124
|z (OCoLC)476162632
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Grumberg, O.
|
245 |
1 |
0 |
|a Formal Logical Methods for System Security and Correctness.
|
260 |
|
|
|a Amsterdam :
|b IOS Press,
|c 2008.
|
300 |
|
|
|a 1 online resource (332 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a NATO Science for Peace and Security Series: Information and Communication Security, v. 14
|
505 |
0 |
|
|a Title page; Preface; Contents; Compilation of Certificates; Formal Foundations of Computer Security; Building a Software Model Checker; Symbolic Trajectory Evaluation (STE): Automatic Refinement and Vacuity Detection; Automated and Interactive Theorem Proving; Correctness of Effect-Based Program Transformations; Abstract and Concrete Models for Recursion; Secrecy Analysis in Protocol Composition Logic; The Engineering Challenges of Trustworthy Computing; Reflecting Quantifier Elimination for Linear Arithmetic; Content in Proofs of List Reversal; Proof Theory, Large Functions and Combinatorics.
|
505 |
8 |
|
|a Author Index.
|
520 |
|
|
|a Offers information in the field of proof technology in connection with secure and correct software. This title shows that methods of correct-by-construction program and process synthesis allow a high level programming method more amenable to security and reliability analysis and guarantees.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer logic
|v Congresses.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
6 |
|a Logique informatique
|v Congrès.
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès.
|
650 |
|
7 |
|a Computer logic
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Nipkow, T.
|
700 |
1 |
|
|a Pfaller, C.
|
758 |
|
|
|i has work:
|a Formal Logical Methods for System Security and Correctness (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCYRHy9D6VDvwPtYhmdBWJ8
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
1 |
|
|z 9781586038434
|
830 |
|
0 |
|a NATO Science for Peace and Security Series: Information and Communication Security, v. 14.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=346214
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL346214
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2823753
|
994 |
|
|
|a 92
|b IZTAP
|