|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-17127-2 |
003 |
DE-He213 |
005 |
20220120105024.0 |
007 |
cr nn 008mamaa |
008 |
150427s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319171272
|9 978-3-319-17127-2
|
024 |
7 |
|
|a 10.1007/978-3-319-17127-2
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Risks and Security of Internet and Systems
|h [electronic resource] :
|b 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers /
|c edited by Javier Lopez, Indrajit Ray, Bruno Crispo.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XI, 275 p. 70 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 8924
|
505 |
0 |
|
|a Trust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Cryptology.
|
700 |
1 |
|
|a Lopez, Javier.
|e editor.
|0 (orcid)0000-0001-8066-9991
|1 https://orcid.org/0000-0001-8066-9991
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ray, Indrajit.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Crispo, Bruno.
|e editor.
|0 (orcid)0000-0002-1252-8465
|1 https://orcid.org/0000-0002-1252-8465
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319171289
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319171265
|
830 |
|
0 |
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 8924
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-17127-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|