|
|
|
|
LEADER |
03268nam a22004455i 4500 |
001 |
000294360 |
005 |
20211108080620.0 |
007 |
cr nn 008mamaa |
008 |
170301s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319548760
|
024 |
7 |
|
|a 10.1007/978-3-319-54876-0
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Risks and Security of Internet and Systems :
|b 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers /
|c edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a VIII, 239 p. 67 illus. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 10158
|
505 |
0 |
|
|a Protection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating -- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams -- Towards the weaving of the characteristics of good security requirements -- Methodology for Security -- Towards Empirical Evaluation of Automated Risk Assessment Methods -- An n-sided polygonal model to calculate the impact of cyber security events -- Security and Formal Methods -- SPTool – equivalence checker for SAND attack trees -- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study -- Network Security -- A Proactive Stateful Firewall for Software Defined Networking -- Protocol Reverse Engineering: Challenges and Obfuscation -- Detection and Monitoring -- Detecting anomalous behavior in DBMS logs -- Online link disclosure strategies for social networks -- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory -- Cryptography -- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication -- Improving Side-Channel Attacks against Pairing-Based Cryptography -- A First DFA on PRIDE: from Theory to Practice.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
700 |
1 |
|
|a Cuppens, Frédéric.
|e editor.
|
700 |
1 |
|
|a Cuppens, Nora.
|e editor.
|
700 |
1 |
|
|a Lanet, Jean-Louis.
|e editor.
|0 (orcid)0000-0002-4751-3941
|1 https://orcid.org/0000-0002-4751-3941
|
700 |
1 |
|
|a Legay, Axel.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
900 |
|
|
|a Libro descargado a ALEPH en bloque (proveniente de proveedor)
|