Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings /
Saved in:
Meeting name: | ICISS (Conference) (7th : 2011 : Calcutta, India) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2011. |
Description: | 1 online resource (xv, 388 pages). |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 7093 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 7093. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11076235 |
MARC
LEADER | 00000cam a2200000Ka 4500 | ||
---|---|---|---|
001 | 11076235 | ||
005 | 20170630050119.7 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 111121s2011 gw ob 101 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d COO |d VPI |d WAU |d UKMGB |d OCLCQ |d OCLCF |d BEDGE |d DKDLA |d OCLCQ |d OCLCO |d YDXCP |d NUI |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d NAM |d OCLCO |d OCLCA | ||
016 | 7 | |a 015975137 |2 Uk | |
020 | |a 9783642255601 |q (electronic bk.) | ||
020 | |a 3642255604 |q (electronic bk.) | ||
020 | |z 9783642255595 | ||
035 | |a (OCoLC)761697573 | ||
050 | 4 | |a QA76.9.A25 |b I25 2011 | |
049 | |a MAIN | ||
111 | 2 | |a ICISS (Conference) |n (7th : |d 2011 : |c Calcutta, India) | |
245 | 1 | 0 | |a Information Systems Security : |b 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings / |c Sushil Jajodia, Chandan Mazumdar (eds.). |
260 | |a Berlin ; |a New York : |b Springer, |c ©2011. | ||
300 | |a 1 online resource (xv, 388 pages). | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 7093 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
520 | |a This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security. | ||
650 | 0 | |a Computer security |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101458 | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 0 | |a Data encryption (Computer science) |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102033 | |
650 | 0 | |a Data protection |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102034 | |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958 | |
650 | 7 | |a Authentifikation |2 gnd | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Datensicherung |2 gnd | |
650 | 7 | |a Informationssystem |2 gnd | |
650 | 7 | |a Kryptoanalyse |2 gnd | |
650 | 7 | |a Privatsphäre |2 gnd | |
650 | 7 | |a Rechnernetz |2 gnd | |
650 | 7 | |a Zugriffskontrolle |2 gnd | |
653 | 4 | |a Data protection | |
653 | 4 | |a Data encryption (Computer science) | |
653 | 4 | |a Information storage and retrieval systems | |
653 | 4 | |a Information Systems | |
653 | 4 | |a Systems and Data Security | |
653 | 4 | |a Information Storage and Retrieval | |
653 | 4 | |a Management of Computing and Information Systems | |
653 | 4 | |a Data Encryption | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
700 | 1 | |a Jajodia, Sushil. |0 http://id.loc.gov/authorities/names/nr89003763 |1 http://viaf.org/viaf/44471967 | |
700 | 1 | |a Mazumdar, Chandan. |0 http://id.loc.gov/authorities/names/no2005109897 |1 http://viaf.org/viaf/41582855 | |
830 | 0 | |a Lecture notes in computer science ; |v 7093. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-25560-1 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i d91e79cb-9743-5546-8d26-625db561df6f |s c81cf2f2-94ce-5897-a1bc-54b1afc22b6b |
928 | |t Library of Congress classification |a QA76.9.A25 I25 2011 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-25560-1 |z SpringerLink |g ebooks |i 9886021 |