|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-45719-2 |
003 |
DE-He213 |
005 |
20220115065111.0 |
007 |
cr nn 008mamaa |
008 |
160906s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319457192
|9 978-3-319-45719-2
|
024 |
7 |
|
|a 10.1007/978-3-319-45719-2
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Research in Attacks, Intrusions, and Defenses
|h [electronic resource] :
|b 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings /
|c edited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIII, 482 p. 126 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9854
|
505 |
0 |
|
|a Systems security -- Low-level attacks and defenses -- Measurement studies.-Malware analysis -- Network security -- Systematization of knowledge and experience reports -- Web and mobile security.
|
520 |
|
|
|a This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016. The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Monrose, Fabian.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Dacier, Marc.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Blanc, Gregory.
|e editor.
|0 (orcid)0000-0001-8150-6617
|1 https://orcid.org/0000-0001-8150-6617
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Garcia-Alfaro, Joaquin.
|e editor.
|0 (orcid)0000-0002-7453-4393
|1 https://orcid.org/0000-0002-7453-4393
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319457185
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319457208
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9854
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-45719-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|