|
|
|
|
LEADER |
03255nam a22005535i 4500 |
001 |
978-3-319-11203-9 |
003 |
DE-He213 |
005 |
20210624214448.0 |
007 |
cr nn 008mamaa |
008 |
140814s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319112039
|9 978-3-319-11203-9
|
024 |
7 |
|
|a 10.1007/978-3-319-11203-9
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Computer Security - ESORICS 2014
|h [electronic resource] :
|b 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I /
|c edited by Miroslaw Kutylowski, Jaideep Vaidya.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XVI, 545 p. 122 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8712
|
505 |
0 |
|
|a Cryptography, formal methods and theory of security -- Security services -- Intrusion/anomaly detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database and storage security -- Software and application security -- Human and societal aspects of security and privacy.
|
520 |
|
|
|a The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I24067
|
700 |
1 |
|
|a Kutylowski, Miroslaw.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Vaidya, Jaideep.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319112046
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319112022
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8712
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-11203-9
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|