Saltar al contenido
VuFind
  • Lenguaje
    • English
    • Español
Avanzado
  • Proceedings of the 3rd Europea...
  • Descripción
  • Citar
  • Enviar este por Correo electrónico
  • Imprimir
  • Exportar Registro
    • Exportar a RefWorks
    • Exportar a EndNoteWeb
    • Exportar a EndNote
    • Exportar a MARC
    • Exportar a RDF
    • Exportar a BibTeX
    • Exportar a RIS
Proceedings of the 3rd European Conference on Computer Network Defense
Código QR

Proceedings of the 3rd European Conference on Computer Network Defense

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Siris, Vasilios. (Editor ), Ioannidis, Sotiris. (Editor ), Anagnostakis, Kostas. (Editor ), Trimintzios, Panagiotis. (Editor )
Formato: eBook
Lenguaje:English
Publicado: New York, NY : Springer US : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Lecture Notes in Electrical Engineering, 30
Materias:
Computer security.
Electrical engineering.
Electronics.
Microelectronics.
Management information systems.
Computer science.
Computer communication systems.
Computer software-Reusability.
Systems and Data Security.
Communications Engineering, Networks.
Electronics and Microelectronics, Instrumentation.
Management of Computing and Information Systems.
Computer Communication Networks.
Performance and Reliability.
Acceso en línea:https://doi.org/10.1007/978-0-387-85555-4
  • Existencias
  • Descripción
  • Tabla de Contenidos
  • Ejemplares similares
  • Vista Equipo
Descripción
Descripción Física:X, 166 p. 25 illus. online resource.
ISBN:9780387855554

Ejemplares similares

  • Network Traffic Anomaly Detection and Prevention : Concepts, Techniques, and Tools /
    por: Bhuyan, Monowar H., et al.
    Publicado: (2017)
  • Information Security of Highly Critical Wireless Networks /
    por: Martellini, Maurizio., et al.
    Publicado: (2017)
  • IT Security Management : IT Securiteers - Setting up an IT Security Function /
    por: Partida, Alberto., et al.
    Publicado: (2010)
  • The Second Economy : The Race for Trust, Treasure and Time in the Cybersecurity War /
    por: Grobman, Steve., et al.
    Publicado: (2016)
  • IP-Traffic Theory and Performance
    por: Grimm, Christian., et al.
    Publicado: (2008)

© Copyright 2024, Todos los Derechos Reservados SIIDCA-CSUCA

Cargando...
Cannot write session to /tmp/vufind_sessions/sess_eb3h1sj6dtbmuoi981kigrb1mr