|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-31909-9 |
003 |
DE-He213 |
005 |
20220117134005.0 |
007 |
cr nn 008mamaa |
008 |
120923s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642319099
|9 978-3-642-31909-9
|
024 |
7 |
|
|a 10.1007/978-3-642-31909-9
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Privacy in Communication Networks
|h [electronic resource] :
|b 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers /
|c edited by Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIV, 548 p. 174 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-822X ;
|v 96
|
505 |
0 |
|
|a network intrusion detection -- anonymity and privacy -- wireless security -- system security -- DNS and routing secuity -- key management.
|
520 |
|
|
|a This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Operating Systems.
|
700 |
1 |
|
|a Rajarajan, Muttukrishnan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Piper, Fred.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, Haining.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Kesidis, George.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642319105
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642319082
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-822X ;
|v 96
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-31909-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|