Computer Network Security (Record no. 181357)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04944nam a22006615i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-642-33704-8 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125743.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121026s2012 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783642337048 |
-- | 978-3-642-33704-8 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-642-33704-8 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Computer Network Security |
Medium | [electronic resource] : |
Remainder of title | 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings / |
Statement of responsibility, etc | edited by Igor Kotenko, Victor Skormin. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2012. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 2012. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 319 p. 83 illus. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Computer Communication Networks and Telecommunications, |
International Standard Serial Number | 2945-9184 ; |
Volume number/sequential designation | 7531 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Finding Malware on a Web Scale. -- Exposing Security Risks for Commercial Mobile Devices -- From Qualitative to Quantitative Enforcement of Security Policy -- Design and Implementation of a Cloud-Based Assured Information Sharing System -- Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries -- A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols -- Blind 384-bit Digital Signature Scheme -- RABAC: Role-Centric Attribute-Based Access Control -- Trust-Aware RBAC -- Alternative Mechanisms for Information Security -- Flow Policies by a Three-Valued Analysis -- Towards the Orchestration of Secured Services under Non-disclosure Policies -- An Approach for Network Information Flow Analysis for Systems of Embedded Components -- Individual Countermeasure Selection Based on the Return On Response Investment Index -- Security and Reliability Requirements for Advanced Security Event Management -- Model-Based Security Event Management -- Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks -- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation -- Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems -- Malware Characterization Using Behavioral Components -- MADAM: A Multi-level Anomaly Detector for Android Malware -- Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods -- Configuration-Based Approach to Embedded Device Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and civilization. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating systems (Computers). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer systems. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and Society. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer System Implementation. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kotenko, Igor. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Skormin, Victor. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783642337031 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783642337055 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Computer Communication Networks and Telecommunications, |
-- | 2945-9184 ; |
Volume number/sequential designation | 7531 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-642-33704-8">https://doi.org/10.1007/978-3-642-33704-8</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.