Normal view MARC view ISBD view

Detection of Intrusions and Malware, and Vulnerability Assessment [electronic resource] : 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings / edited by Thorsten Holz, Herbert Bos.

Contributor(s): Holz, Thorsten [editor.] | Bos, Herbert [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 6739Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: X, 235 p. 86 illus., 44 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642224249.Subject(s): Computer networks  | Electronic data processing -- Management | Cryptography | Data encryption (Computer science) | Computers and civilization | Application software | Algorithms | Computer Communication Networks | IT Operations | Cryptology | Computers and Society | Computer and Information Systems Applications | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial  submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial  submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.

There are no comments for this item.

Log in to your account to post a comment.