|
|
|
|
LEADER |
02904nam a22005895i 4500 |
001 |
978-3-319-62105-0 |
003 |
DE-He213 |
005 |
20170623115316.0 |
007 |
cr nn 008mamaa |
008 |
170623s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319621050
|9 978-3-319-62105-0
|
024 |
7 |
|
|a 10.1007/978-3-319-62105-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Engineering Secure Software and Systems
|h [electronic resource] :
|b 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings /
|c edited by Eric Bodden, Mathias Payer, Elias Athanasopoulos.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a X, 241 p. 63 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10379
|
505 |
0 |
|
|a Cloud security, virtualization for security -- Mobile devices security -- Automated techniques for vulnerability discovery and analysis -- Model checking for security -- Verification techniques for security properties -- Security by design -- Web applications security -- Empirical secure software engineering -- Embedded software security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017. The 12 full papers presented together with 3 short papers were carefully reviewed and selected from 32 submissions. The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Logic design.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Logic Design.
|
650 |
2 |
4 |
|a Operating Systems.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Data Encryption.
|
700 |
1 |
|
|a Bodden, Eric.
|e editor.
|
700 |
1 |
|
|a Payer, Mathias.
|e editor.
|
700 |
1 |
|
|a Athanasopoulos, Elias.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319621043
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10379
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-62105-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|