000 | 02613nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-642-25560-1 | ||
003 | DE-He213 | ||
005 | 20140220083817.0 | ||
007 | cr nn 008mamaa | ||
008 | 111110s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642255601 _9978-3-642-25560-1 |
||
024 | 7 |
_a10.1007/978-3-642-25560-1 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aJajodia, Sushil. _eeditor. |
|
245 | 1 | 0 |
_aInformation Systems Security _h[electronic resource] : _b7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings / _cedited by Sushil Jajodia, Chandan Mazumdar. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_aXV, 388 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7093 |
|
520 | _aThis book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aInformation storage and retrieval systems. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aInformation Storage and Retrieval. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aMazumdar, Chandan. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642255595 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7093 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-25560-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 |
_c108609 _d108609 |