000 | 02934nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-319-47560-8 | ||
003 | DE-He213 | ||
005 | 20240730185403.0 | ||
007 | cr nn 008mamaa | ||
008 | 161008s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319475608 _9978-3-319-47560-8 |
||
024 | 7 |
_a10.1007/978-3-319-47560-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecure IT Systems _h[electronic resource] : _b21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings / _cedited by Billy Bob Brumley, Juha Röning. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aX, 269 p. 43 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10014 |
|
505 | 0 | _aSecurity -- System Security -- Network Security -- Software Security -- Cryptography -- Authentication. | |
520 | _aThis book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016. The 16 full papers presented in this volume were carefully reviewed and selected from 43 submissions. The focus of the conference is on following topics: Security, System Security, Network Security, Software Security, and Information Security.<data security, mobile="" security, security="" protocols, risk="" management, security="" models,="" and vulnerability="" management. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aBiometric identification. _911407 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aBiometrics. _932763 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aBrumley, Billy Bob. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139093 |
|
700 | 1 |
_aRöning, Juha. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139094 |
|
710 | 2 |
_aSpringerLink (Online service) _9139095 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319475592 |
776 | 0 | 8 |
_iPrinted edition: _z9783319475615 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10014 _9139096 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-47560-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92795 _d92795 |