Detection of Intrusions and Malware, and Vulnerability Assessment (Record no. 53180)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03129nam a22005655i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-40667-1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200420221301.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160611s2016 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319406671 |
-- | 978-3-319-40667-1 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Detection of Intrusions and Malware, and Vulnerability Assessment |
Sub Title | 13th International Conference, DIMVA 2016, San Sebasti�an, Spain, July 7-8, 2016, Proceedings / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIV, 442 p. 103 illus. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Intrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques, and application -- Computer security -- Vulnerability detection -- Attack prevention -- Web security -- Malware detection and classification -- Authentication -- Data leakage prevention -- Countering evasive techniques such as obfuscation. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebasti�an, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation. . |
700 1# - AUTHOR 2 | |
Author 2 | Caballero, Juan. |
700 1# - AUTHOR 2 | |
Author 2 | Zurutuza, Urko. |
700 1# - AUTHOR 2 | |
Author 2 | Rodr�iguez, Ricardo J. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-40667-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2016. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management information systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | E-commerce. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | e-Commerce/e-business. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Management of Computing and Information Systems. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 0302-9743 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.