000 | 03334nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-319-62105-0 | ||
003 | DE-He213 | ||
005 | 20240730192938.0 | ||
007 | cr nn 008mamaa | ||
008 | 170623s2017 sz | s |||| 0|eng d | ||
020 |
_a9783319621050 _9978-3-319-62105-0 |
||
024 | 7 |
_a10.1007/978-3-319-62105-0 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aEngineering Secure Software and Systems _h[electronic resource] : _b9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings / _cedited by Eric Bodden, Mathias Payer, Elias Athanasopoulos. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aX, 241 p. 63 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10379 |
|
505 | 0 | _aCloud security, virtualization for security -- Mobile devices security -- Automated techniques for vulnerability discovery and analysis -- Model checking for security -- Verification techniques for security properties -- Security by design -- Web applications security -- Empirical secure software engineering -- Embedded software security. | |
520 | _aThis book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017. The 12 full papers presented together with 3 short papers were carefully reviewed and selected from 32 submissions. The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aLogic design. _93686 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9151879 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aLogic Design. _93686 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aBodden, Eric. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151880 |
|
700 | 1 |
_aPayer, Mathias. _eeditor. _0(orcid) _10000-0001-5054-7547 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151881 |
|
700 | 1 |
_aAthanasopoulos, Elias. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9151882 |
|
710 | 2 |
_aSpringerLink (Online service) _9151883 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319621043 |
776 | 0 | 8 |
_iPrinted edition: _z9783319621067 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10379 _9151884 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-62105-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94517 _d94517 |