|
|
|
|
LEADER |
02631nam a22005295i 4500 |
001 |
978-981-10-5421-1 |
003 |
DE-He213 |
005 |
20170622153731.0 |
007 |
cr nn 008mamaa |
008 |
170622s2017 si | s |||| 0|eng d |
020 |
|
|
|a 9789811054211
|9 978-981-10-5421-1
|
024 |
7 |
|
|a 10.1007/978-981-10-5421-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applications and Techniques in Information Security
|h [electronic resource] :
|b 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings /
|c edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIV, 223 p. 68 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 719
|
505 |
0 |
|
|a Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Batten, Lynn.
|e editor.
|
700 |
1 |
|
|a Kim, Dong Seong.
|e editor.
|
700 |
1 |
|
|a Zhang, Xuyun.
|e editor.
|
700 |
1 |
|
|a Li, Gang.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811054204
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 719
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-981-10-5421-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|