|
|
|
|
| LEADER |
02763nam a22005655i 4500 |
| 001 |
978-3-642-27585-2 |
| 003 |
DE-He213 |
| 005 |
20151029221126.0 |
| 007 |
cr nn 008mamaa |
| 008 |
120202s2012 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783642275852
|9 978-3-642-27585-2
|
| 024 |
7 |
|
|a 10.1007/978-3-642-27585-2
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a QA76.9.A25
|
| 072 |
|
7 |
|a UR
|2 bicssc
|
| 072 |
|
7 |
|a UTN
|2 bicssc
|
| 072 |
|
7 |
|a COM053000
|2 bisacsh
|
| 082 |
0 |
4 |
|a 005.8
|2 23
|
| 245 |
1 |
0 |
|a Open Problems in Network Security
|h [electronic resource] :
|b IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers /
|c edited by Jan Camenisch, Dogan Kesdogan.
|
| 264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2012.
|
| 300 |
|
|
|a VIII, 161 p. 38 illus.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7039
|
| 520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.
|
| 650 |
|
0 |
|a Computer science.
|
| 650 |
|
0 |
|a Computer communication systems.
|
| 650 |
|
0 |
|a Computer security.
|
| 650 |
|
0 |
|a Data encryption (Computer science).
|
| 650 |
|
0 |
|a Computers and civilization.
|
| 650 |
|
0 |
|a Management information systems.
|
| 650 |
1 |
4 |
|a Computer Science.
|
| 650 |
2 |
4 |
|a Systems and Data Security.
|
| 650 |
2 |
4 |
|a Data Encryption.
|
| 650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
| 650 |
2 |
4 |
|a Computer Communication Networks.
|
| 650 |
2 |
4 |
|a Computers and Society.
|
| 650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
| 700 |
1 |
|
|a Camenisch, Jan.
|e editor.
|
| 700 |
1 |
|
|a Kesdogan, Dogan.
|e editor.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783642275845
|
| 830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7039
|
| 856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-27585-2
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 912 |
|
|
|a ZDB-2-LNC
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|