000 | 02810nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-642-22424-9 | ||
003 | DE-He213 | ||
005 | 20240423130045.0 | ||
007 | cr nn 008mamaa | ||
008 | 110620s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642224249 _9978-3-642-22424-9 |
||
024 | 7 |
_a10.1007/978-3-642-22424-9 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aDetection of Intrusions and Malware, and Vulnerability Assessment _h[electronic resource] : _b8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings / _cedited by Thorsten Holz, Herbert Bos. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aX, 235 p. 86 illus., 44 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6739 |
|
520 | _aThis book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security. | ||
650 | 0 | _aComputer networks . | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aAlgorithms. | |
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aIT Operations. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aAlgorithms. |
700 | 1 |
_aHolz, Thorsten. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBos, Herbert. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642224232 |
776 | 0 | 8 |
_iPrinted edition: _z9783642224256 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6739 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-22424-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c184567 _d184567 |