000 | 03207nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-319-17127-2 | ||
003 | DE-He213 | ||
005 | 20240423125757.0 | ||
007 | cr nn 008mamaa | ||
008 | 150427s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319171272 _9978-3-319-17127-2 |
||
024 | 7 |
_a10.1007/978-3-319-17127-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aRisks and Security of Internet and Systems _h[electronic resource] : _b9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / _cedited by Javier Lopez, Indrajit Ray, Bruno Crispo. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXI, 275 p. 70 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v8924 |
|
505 | 0 | _aTrust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling. | |
520 | _aThis book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer networks . | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aIT Operations. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aCryptology. |
700 | 1 |
_aLopez, Javier. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRay, Indrajit. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCrispo, Bruno. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319171265 |
776 | 0 | 8 |
_iPrinted edition: _z9783319171289 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v8924 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-17127-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c181586 _d181586 |