| 000 | 02971nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-31909-9 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083323.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120923s2012 gw | s |||| 0|eng d | ||
| 020 |
_a9783642319099 _9978-3-642-31909-9 |
||
| 024 | 7 |
_a10.1007/978-3-642-31909-9 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aUTN _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aRajarajan, Muttukrishnan. _eeditor. |
|
| 245 | 1 | 0 |
_aSecurity and Privacy in Communication Networks _h[electronic resource] : _b7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers / _cedited by Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
| 300 |
_aXIV, 548 p. 174 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v96 |
|
| 505 | 0 | _anetwork intrusion detection -- anonymity and privacy -- wireless security -- system security -- DNS and routing secuity -- key management. | |
| 520 | _aThis volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aOperating systems (Computers). | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
| 650 | 2 | 4 | _aOperating Systems. |
| 700 | 1 |
_aPiper, Fred. _eeditor. |
|
| 700 | 1 |
_aWang, Haining. _eeditor. |
|
| 700 | 1 |
_aKesidis, George. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642319082 |
| 830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v96 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-31909-9 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c103428 _d103428 |
||