|
|
|
|
LEADER |
02235nmm a2200349 u 4500 |
001 |
EB000896015 |
003 |
EBX01000000000000000693135 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
140908 ||| eng |
020 |
|
|
|a 9783319112121
|
100 |
1 |
|
|a Kutylowski, Miroslaw
|e [editor]
|
245 |
0 |
0 |
|a Computer Security - ESORICS 2014
|h Elektronische Ressource
|b 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
|c edited by Miroslaw Kutylowski, Jaideep Vaidya
|
250 |
|
|
|a 1st ed. 2014
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2014, 2014
|
300 |
|
|
|a XVI, 516 p. 106 illus
|b online resource
|
505 |
0 |
|
|a Cryptography, formal methods and theory of security -- Security services -- Intrusion/anomaly detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database and storage security -- Software and application security -- Human and societal aspects of security and privacy
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Vaidya, Jaideep
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-319-11212-1
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-11212-1?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy
|