000 | 02707nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-642-22424-9 | ||
003 | DE-He213 | ||
005 | 20160615111434.0 | ||
007 | cr nn 008mamaa | ||
008 | 110620s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642224249 _9978-3-642-22424-9 |
||
024 | 7 |
_a10.1007/978-3-642-22424-9 _2doi |
|
049 | _aAlfaisal Main Library | ||
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aDetection of Intrusions and Malware, and Vulnerability Assessment _h[electronic resource] : _b8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings / _cedited by Thorsten Holz, Herbert Bos. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_aX, 235 p. 86 illus., 44 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6739 |
|
520 | _aThis book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intialĀ submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
655 | 7 |
_aElectronic books. _2local |
|
700 | 1 |
_aHolz, Thorsten. _eeditor. |
|
700 | 1 |
_aBos, Herbert. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642224232 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6739 |
|
856 | 4 | 0 | _uhttp://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-642-22424-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 |
_2lcc _cEBOOKS |
||
999 |
_c289493 _d289493 |