Detection of intrusions and malware, and vulnerability assessment : 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings /
Saved in:
Meeting name: | DIMVA 2010 (2010 : Bonn, Germany) |
---|---|
Imprint: | Berlin ; Heidelberg : Springer-Verlag, ©2010. |
Description: | 1 online resource (xii, 218 pages). |
Language: | English |
Series: | Lecture notes in computer science ; 6201 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 6201. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11074593 |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | 11074593 | ||
005 | 20170630045029.3 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 100909s2010 gw ob 101 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d CEF |d OCLCQ |d CUS |d E7B |d COO |d LEAUB |d OCLCO |d OCLCQ |d NLGGC |d OCLCQ |d OCLCF |d BEDGE |d OHS |d OCLCQ |d OCLCO |d YDXCP |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d SOI |d OCLCO |d OCLCA |d DGU |d OCLCO | ||
019 | |a 646317188 |a 654374428 |a 769769486 | ||
020 | |a 9783642142154 | ||
020 | |a 364214215X | ||
020 | |z 3642142141 | ||
020 | |z 9783642142147 | ||
035 | |a (OCoLC)663096829 |z (OCoLC)646317188 |z (OCoLC)654374428 |z (OCoLC)769769486 | ||
037 | |a 978-3-642-14214-7 |b Springer |n http://www.springerlink.com | ||
050 | 4 | |a TK5105.59 |b .D56 2010 | |
060 | 4 | |a TK 5105.59 | |
084 | |a 54.62 |2 bcl | ||
049 | |a MAIN | ||
111 | 2 | |a DIMVA 2010 |d (2010 : |c Bonn, Germany) |0 http://id.loc.gov/authorities/names/nb2010020807 |1 http://viaf.org/viaf/312856976 | |
245 | 1 | 0 | |a Detection of intrusions and malware, and vulnerability assessment : |b 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings / |c Christian Kreibich, Marko Jahnke (Eds.). |
260 | |a Berlin ; |a Heidelberg : |b Springer-Verlag, |c ©2010. | ||
300 | |a 1 online resource (xii, 218 pages). | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Lecture notes in computer science ; |v 6201 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
504 | |a Includes bibliographical references and author index. | ||
520 | 8 | |a Annotation |b This book constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2010, held in Bonn, Germany, in July 2010. The 12 revised full papers presented together with two extended abstracts were carefully selected from 34 initial submissions. The papers are organized in topical sections on host security, trends, vulnerabilities, intrusion detection and web security. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 0 | |a Computer networks |x Access control |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2007008426 | |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Computer networks |x Access control. |2 fast |0 (OCoLC)fst00872298 | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 2 | |a Computer Security. | |
650 | 2 | |a Computer Communication Networks. | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
655 | 2 | |a Congresses. | |
700 | 1 | |a Kreibich, Christian. |0 http://id.loc.gov/authorities/names/nb2010020808 |1 http://viaf.org/viaf/150857377 | |
700 | 1 | |a Jahnke, Marko. |0 http://id.loc.gov/authorities/names/nb2010020811 |1 http://viaf.org/viaf/131617627 | |
776 | 0 | 8 | |i Print version: |t Detection of intrusions and malware, and vulnerability ... |d [S.l.] : Springer, 2010 |z 3642142141 |w (OCoLC)641468678 |
830 | 0 | |a Lecture notes in computer science ; |v 6201. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-14215-4 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i 11194dbc-6979-58b5-84c1-7c4fff094c3a |s 284700bb-ddd2-5b25-bbc5-9bd504363540 |
928 | |t Library of Congress classification |a TK5105.59 .D56 2010 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-14215-4 |z SpringerLink |g ebooks |i 9883572 |