|
|
|
|
| LEADER |
02806nam a22005895i 4500 |
| 001 |
978-3-319-17127-2 |
| 003 |
DE-He213 |
| 005 |
20151106161239.0 |
| 007 |
cr nn 008mamaa |
| 008 |
150427s2015 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783319171272
|9 978-3-319-17127-2
|
| 024 |
7 |
|
|a 10.1007/978-3-319-17127-2
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a QA76.9.A25
|
| 072 |
|
7 |
|a UR
|2 bicssc
|
| 072 |
|
7 |
|a UTN
|2 bicssc
|
| 072 |
|
7 |
|a COM053000
|2 bisacsh
|
| 082 |
0 |
4 |
|a 005.8
|2 23
|
| 245 |
1 |
0 |
|a Risks and Security of Internet and Systems
|h [electronic resource] :
|b 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers /
|c edited by Javier Lopez, Indrajit Ray, Bruno Crispo.
|
| 264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
| 300 |
|
|
|a XI, 275 p. 70 illus.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8924
|
| 505 |
0 |
|
|a Trust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling.
|
| 520 |
|
|
|a This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.
|
| 650 |
|
0 |
|a Computer science.
|
| 650 |
|
0 |
|a Computer communication systems.
|
| 650 |
|
0 |
|a Software engineering.
|
| 650 |
|
0 |
|a Computer security.
|
| 650 |
|
0 |
|a Data encryption (Computer science).
|
| 650 |
|
0 |
|a Management information systems.
|
| 650 |
1 |
4 |
|a Computer Science.
|
| 650 |
2 |
4 |
|a Systems and Data Security.
|
| 650 |
2 |
4 |
|a Computer Communication Networks.
|
| 650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
| 650 |
2 |
4 |
|a Software Engineering.
|
| 650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
| 650 |
2 |
4 |
|a Data Encryption.
|
| 700 |
1 |
|
|a Lopez, Javier.
|e editor.
|
| 700 |
1 |
|
|a Ray, Indrajit.
|e editor.
|
| 700 |
1 |
|
|a Crispo, Bruno.
|e editor.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783319171265
|
| 830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8924
|
| 856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-17127-2
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 912 |
|
|
|a ZDB-2-LNC
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|