000 01721cam a2200397 a 4500
001 15501858
005 20170112200226.0
008 081028s2008 gw a b 101 0 eng d
010 _a 2008940485
015 _a991139593
_2dnb
016 7 _a991139593
_2GyFmDB
020 _a9783540898610
035 _a(OCoLC)ocn276807196
040 _aOHX
_cOHX
_dYDXCP
_dTXH
_dIXA
_dGBVCP
_dDLC
042 _alccopycat
050 0 0 _aQA76.9.A25
_bI5543 2008
072 7 _aQA
_2lcco
082 0 0 _a005.8
_bSEK-I
100 _aSekar, R.
245 1 0 _aInformation systems security :
_b4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings
_cR. Sekar, Arun K. Pujari (eds.).
260 _aBerlin :
_bSpringer,
_c©2008.
300 _axiii, 305 p. :
_bill. ;
_c24 cm.
490 0 _aLecture notes in computer science,
_x0302-9743 ;
_v5352
504 _aIncludes bibliographical references and index.
650 0 _aComputer security
_vCongresses.
650 0 _aComputers
_xAccess control
_vCongresses.
650 4 _aEindringerkennung
_vKongress
_zHyderabad <Andhra Pradesh, 2008>
650 4 _aInformationssystem
_xServiceorientierte Architektur
_xTrusted Computing
_vKongress
_zHyderabad <Andhra Pradesh, 2008>
650 4 _aKryptoanalyse
_vKongress
_zHyderabad <Andhra Pradesh, 2008>
650 4 _aKryptologie
_vKongress
_zHyderabad <Andhra Pradesh, 2008>
650 4 _aRechnernetz
_xDatensicherung
_xComputersicherheit
_vKongress
_zHyderabad <Andhra Pradesh, 2008>
700 1 _aPujari, Arun K.
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c10531
_d10531