000 | 03103nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-642-34266-0 | ||
003 | DE-He213 | ||
005 | 20240730194656.0 | ||
007 | cr nn 008mamaa | ||
008 | 121116s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642342660 _9978-3-642-34266-0 |
||
024 | 7 |
_a10.1007/978-3-642-34266-0 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _bThird International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings / _cedited by Jens Grossklags, Jean Walrand. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXII, 309 p. 48 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7638 |
|
505 | 0 | _aSecret Communications -- Identification of Attackers -- Multi-step Attacks -- Network Security -- System Defense -- Applications Security. Identification of Attackers -- Multi-step Attacks -- Network Security -- System Defense -- Applications Security. | |
520 | _aThis book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security. | ||
650 | 0 |
_aApplication software. _9157719 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9157720 |
|
650 | 0 |
_aGame theory. _96996 |
|
650 | 1 | 4 |
_aComputer and Information Systems Applications. _9157721 |
650 | 2 | 4 |
_aComputer Communication Networks. _9157722 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aGame Theory. _96996 |
700 | 1 |
_aGrossklags, Jens. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157723 |
|
700 | 1 |
_aWalrand, Jean. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157724 |
|
710 | 2 |
_aSpringerLink (Online service) _9157725 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642342653 |
776 | 0 | 8 |
_iPrinted edition: _z9783642342677 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7638 _9157726 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-34266-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95286 _d95286 |