000 | 02950nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-319-11379-1 | ||
003 | DE-He213 | ||
005 | 20240423125013.0 | ||
007 | cr nn 008mamaa | ||
008 | 140820s2014 sz | s |||| 0|eng d | ||
020 |
_a9783319113791 _9978-3-319-11379-1 |
||
024 | 7 |
_a10.1007/978-3-319-11379-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aResearch in Attacks, Intrusions and Defenses _h[electronic resource] : _b17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings / _cedited by Angelos Stavrou, Herbert Bos, Georgios Portokalidis. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXIV, 490 p. 114 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v8688 |
|
505 | 0 | _aComputer security.- Network security -- Authentication -- Malware -- Intrusion detection -- Browser security -- Web application security -- Wireless security -- Vulnerability analysis. | |
520 | _aThis book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis. | ||
650 | 0 | _aData protection. | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aIT Operations. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aStavrou, Angelos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBos, Herbert. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPortokalidis, Georgios. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319113784 |
776 | 0 | 8 |
_iPrinted edition: _z9783319113807 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v8688 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-11379-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c173143 _d173143 |