000 | 02977nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-642-21694-7 | ||
003 | DE-He213 | ||
005 | 20240730185940.0 | ||
007 | cr nn 008mamaa | ||
008 | 120210s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642216947 _9978-3-642-21694-7 |
||
024 | 7 |
_a10.1007/978-3-642-21694-7 _2doi |
|
050 | 4 | _aQA76.9.M3 | |
072 | 7 |
_aKJQ _2bicssc |
|
072 | 7 |
_aCOM039000 _2bisacsh |
|
072 | 7 |
_aKJQ _2thema |
|
082 | 0 | 4 |
_a004.068 _223 |
245 | 1 | 0 |
_aCritical Information Infrastructure Security _h[electronic resource] : _b5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers / _cedited by Christos Xenakis, Stephen Wolthusen. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aX, 161 p. 54 illus., 33 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6712 |
|
520 | _aThis book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data. | ||
650 | 0 |
_aElectronic data processing _xManagement. _9140936 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers, Special purpose. _946653 |
|
650 | 0 |
_aElectronic digital computers _xEvaluation. _921495 |
|
650 | 1 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aHardware Performance and Reliability. _932357 |
650 | 2 | 4 |
_aComputer Communication Networks. _9140937 |
650 | 2 | 4 |
_aSpecial Purpose and Application-Based Systems. _946654 |
650 | 2 | 4 |
_aSystem Performance and Evaluation. _932047 |
700 | 1 |
_aXenakis, Christos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9140938 |
|
700 | 1 |
_aWolthusen, Stephen. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9140939 |
|
710 | 2 |
_aSpringerLink (Online service) _9140940 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642216930 |
776 | 0 | 8 |
_iPrinted edition: _z9783642216954 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6712 _9140941 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-21694-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93039 _d93039 |