000 | 01721cam a2200397 a 4500 | ||
---|---|---|---|
001 | 15501858 | ||
005 | 20170112200226.0 | ||
008 | 081028s2008 gw a b 101 0 eng d | ||
010 | _a 2008940485 | ||
015 |
_a991139593 _2dnb |
||
016 | 7 |
_a991139593 _2GyFmDB |
|
020 | _a9783540898610 | ||
035 | _a(OCoLC)ocn276807196 | ||
040 |
_aOHX _cOHX _dYDXCP _dTXH _dIXA _dGBVCP _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bI5543 2008 |
072 | 7 |
_aQA _2lcco |
|
082 | 0 | 0 |
_a005.8 _bSEK-I |
100 | _aSekar, R. | ||
245 | 1 | 0 |
_aInformation systems security : _b4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings _cR. Sekar, Arun K. Pujari (eds.). |
260 |
_aBerlin : _bSpringer, _c©2008. |
||
300 |
_axiii, 305 p. : _bill. ; _c24 cm. |
||
490 | 0 |
_aLecture notes in computer science, _x0302-9743 ; _v5352 |
|
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aComputer security _vCongresses. |
|
650 | 0 |
_aComputers _xAccess control _vCongresses. |
|
650 | 4 |
_aEindringerkennung _vKongress _zHyderabad <Andhra Pradesh, 2008> |
|
650 | 4 |
_aInformationssystem _xServiceorientierte Architektur _xTrusted Computing _vKongress _zHyderabad <Andhra Pradesh, 2008> |
|
650 | 4 |
_aKryptoanalyse _vKongress _zHyderabad <Andhra Pradesh, 2008> |
|
650 | 4 |
_aKryptologie _vKongress _zHyderabad <Andhra Pradesh, 2008> |
|
650 | 4 |
_aRechnernetz _xDatensicherung _xComputersicherheit _vKongress _zHyderabad <Andhra Pradesh, 2008> |
|
700 | 1 | _aPujari, Arun K. | |
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c10531 _d10531 |