|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3262269 |
003 |
MWH |
005 |
20191023112625.0 |
007 |
cr nn 008mamaa |
008 |
170811s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319664026
|
024 |
7 |
|
|a 10.1007/978-3-319-66402-6
|2 doi
|
035 |
|
|
|a (DE-He213)978-3-319-66402-6
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
245 |
1 |
0 |
|a Computer Security – ESORICS 2017
|h [electronic resource] :
|b 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I /
|c edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes.
|
250 |
|
|
|a 1st ed. 2017.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XXI, 485 p. 106 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10492
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
|
520 |
|
|
|a The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
690 |
|
|
|a Electronic resources (E-books)
|
700 |
1 |
|
|a Foley, Simon N.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Gollmann, Dieter.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Snekkenes, Einar.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a Security and Cryptology ;
|v 10492
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-319-66402-6
|3 Click to view e-book
|t 0
|
907 |
|
|
|a .b32622697
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g gw
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i21754317
|z 02-26-20
|
999 |
f |
f |
|i 92c3125d-98e4-5786-ad34-198565fe91cf
|s 7709ac9d-4c5f-5f6c-8926-91376976f8cf
|t 0
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|t 0
|e E-Book
|h Library of Congress classification
|i Elec File
|