| 000 | 03394nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-85555-4 | ||
| 003 | DE-He213 | ||
| 005 | 20251006084425.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100608s2009 xxu| s |||| 0|eng d | ||
| 020 | _a9780387855554 | ||
| 020 | _a99780387855554 | ||
| 024 | 7 |
_a10.1007/978-0-387-85555-4 _2doi |
|
| 082 | 0 | 4 |
_a621.382 _223 |
| 100 | 1 |
_aSiris, Vasilios. _eeditor. |
|
| 245 | 1 | 0 |
_aProceedings of the 3rd European Conference on Computer Network Defense _h[electronic resource] / _cedited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios. |
| 250 | _a1. | ||
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2009. |
|
| 300 |
_aX, 166p. 25 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v30 |
|
| 505 | 0 | _aTales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting -- Towards High Assurance Networks of Virtual Machines -- Intrusion Detection Using Cost-Sensitive Classification -- A Novel Approach for Anomaly Detection over High-Speed Networks -- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption -- Vulnerability Response Decision Assistance -- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests -- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat -- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction -- ISi-LANA - A Secure Basic Architecture for Networks Connected to the Internet. | |
| 520 | _aProceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense. | ||
| 650 | 0 | _aENGINEERING. | |
| 650 | 0 | _aOPERATING SYSTEMS (COMPUTERS). | |
| 650 | 0 | _aCOMPUTER NETWORK ARCHITECTURES. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aINFORMATION SYSTEMS. | |
| 650 | 0 | _aCOMPUTER ENGINEERING. | |
| 650 | 0 | _aTELECOMMUNICATION. | |
| 650 | 1 | 4 | _aENGINEERING. |
| 650 | 2 | 4 | _aCOMMUNICATIONS ENGINEERING, NETWORKS. |
| 650 | 2 | 4 | _aMANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aPERFORMANCE AND RELIABILITY. |
| 650 | 2 | 4 | _aELECTRICAL ENGINEERING. |
| 650 | 2 | 4 | _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS. |
| 700 | 1 |
_aAnagnostakis, Kostas. _eeditor. |
|
| 700 | 1 |
_aIoannidis, Sotiris. _eeditor. |
|
| 700 | 1 |
_aTrimintzios, Panagiotis. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387855547 |
| 830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v30 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-85555-4 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-ENG | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c59273 _d59273 |
||