000 | 02856nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-642-34266-0 | ||
003 | DE-He213 | ||
005 | 20140220083329.0 | ||
007 | cr nn 008mamaa | ||
008 | 121116s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642342660 _9978-3-642-34266-0 |
||
024 | 7 |
_a10.1007/978-3-642-34266-0 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUNH _2bicssc |
|
072 | 7 |
_aUDBD _2bicssc |
|
072 | 7 |
_aCOM032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.7 _223 |
100 | 1 |
_aGrossklags, Jens. _eeditor. |
|
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _bThird International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings / _cedited by Jens Grossklags, Jean Walrand. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXII, 309 p. 48 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7638 |
|
505 | 0 | _aSecret Communications -- Identification of Attackers -- Multi-step Attacks -- Network Security -- System Defense -- Applications Security. Identification of Attackers -- Multi-step Attacks -- Network Security -- System Defense -- Applications Security. | |
520 | _aThis book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aComputer software. | |
650 | 0 | _aInformation Systems. | |
650 | 0 | _aMathematics. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aGame Theory, Economics, Social and Behav. Sciences. |
700 | 1 |
_aWalrand, Jean. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642342653 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7638 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-34266-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 |
_c103756 _d103756 |