Detection of intrusions and malware, and vulnerability assessment: second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2005
|
Schriftenreihe: | Lecture notes in computer science
3548 |
Schlagworte: | |
Beschreibung: | X, 240 S. Ill., graph. Darst. |
ISBN: | 3540266135 9783540266136 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV019975108 | ||
003 | DE-604 | ||
005 | 20070822 | ||
007 | t| | ||
008 | 050728s2005 xx ad|| |||| 10||| eng d | ||
020 | |a 3540266135 |9 3-540-26613-5 | ||
020 | |a 9783540266136 |9 978-3-540-26613-6 | ||
035 | |a (OCoLC)61148432 | ||
035 | |a (DE-599)BVBBV019975108 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-91G |a DE-706 |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a DAT 460f |2 stub | ||
245 | 1 | 0 | |a Detection of intrusions and malware, and vulnerability assessment |b second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings |c Klaus Julisch ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2005 | |
300 | |a X, 240 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 3548 | |
650 | 7 | |a Contrôle d'accès |2 rasuqam | |
650 | 7 | |a Détection d'intrusion |2 rasuqam | |
650 | 7 | |a Intrusion informatique |2 rasuqam | |
650 | 7 | |a Logiciel malveillant |2 rasuqam | |
650 | 7 | |a Sécurité informatique |2 rasuqam | |
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 4 | |a Computers |x Access control |x Evaluation |v Congresses | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2005 |z Wien |2 gnd-content | |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Julisch, Klaus |e Sonstige |4 oth | |
711 | 2 | |a DIMVA |n 2 |d 2005 |c Wien |j Sonstige |0 (DE-588)10107794-4 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 3548 |w (DE-604)BV000000607 |9 3548 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-013226947 |
Datensatz im Suchindex
_version_ | 1820874960114024448 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV019975108 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)61148432 (DE-599)BVBBV019975108 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV019975108</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070822</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">050728s2005 xx ad|| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540266135</subfield><subfield code="9">3-540-26613-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540266136</subfield><subfield code="9">978-3-540-26613-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61148432</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019975108</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of intrusions and malware, and vulnerability assessment</subfield><subfield code="b">second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings</subfield><subfield code="c">Klaus Julisch ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 240 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3548</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Contrôle d'accès</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Détection d'intrusion</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intrusion informatique</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Logiciel malveillant</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité informatique</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Evaluation</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2005</subfield><subfield code="z">Wien</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Julisch, Klaus</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">DIMVA</subfield><subfield code="n">2</subfield><subfield code="d">2005</subfield><subfield code="c">Wien</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10107794-4</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3548</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">3548</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013226947</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2005 Wien gnd-content |
genre_facet | Konferenzschrift 2005 Wien |
id | DE-604.BV019975108 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:08:02Z |
institution | BVB |
institution_GND | (DE-588)10107794-4 |
isbn | 3540266135 9783540266136 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013226947 |
oclc_num | 61148432 |
open_access_boolean | |
owner | DE-739 DE-91G DE-BY-TUM DE-706 DE-83 |
owner_facet | DE-739 DE-91G DE-BY-TUM DE-706 DE-83 |
physical | X, 240 S. Ill., graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings Klaus Julisch ... (eds.) Berlin [u.a.] Springer 2005 X, 240 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 3548 Contrôle d'accès rasuqam Détection d'intrusion rasuqam Intrusion informatique rasuqam Logiciel malveillant rasuqam Sécurité informatique rasuqam Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Computers Access control Evaluation Congresses Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2005 Wien gnd-content Malware (DE-588)4687059-3 s DE-604 Eindringerkennung (DE-588)4706627-1 s Kryptoanalyse (DE-588)4830502-9 s Softwareschwachstelle (DE-588)4752508-3 s Zugriffskontrolle (DE-588)4293034-0 s Julisch, Klaus Sonstige oth DIMVA 2 2005 Wien Sonstige (DE-588)10107794-4 oth Lecture notes in computer science 3548 (DE-604)BV000000607 3548 |
spellingShingle | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings Lecture notes in computer science Contrôle d'accès rasuqam Détection d'intrusion rasuqam Intrusion informatique rasuqam Logiciel malveillant rasuqam Sécurité informatique rasuqam Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Computers Access control Evaluation Congresses Zugriffskontrolle (DE-588)4293034-0 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4752508-3 (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)4687059-3 (DE-588)1071861417 |
title | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings |
title_auth | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings |
title_exact_search | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings |
title_full | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings Klaus Julisch ... (eds.) |
title_fullStr | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings Klaus Julisch ... (eds.) |
title_full_unstemmed | Detection of intrusions and malware, and vulnerability assessment second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings Klaus Julisch ... (eds.) |
title_short | Detection of intrusions and malware, and vulnerability assessment |
title_sort | detection of intrusions and malware and vulnerability assessment second international conference dimva 2005 vienna austria july 7 8 2005 proceedings |
title_sub | second international conference, DIMVA 2005, Vienna, Austria, July 7 - 8, 2005 ; proceedings |
topic | Contrôle d'accès rasuqam Détection d'intrusion rasuqam Intrusion informatique rasuqam Logiciel malveillant rasuqam Sécurité informatique rasuqam Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Computers Access control Evaluation Congresses Zugriffskontrolle (DE-588)4293034-0 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Contrôle d'accès Détection d'intrusion Intrusion informatique Logiciel malveillant Sécurité informatique Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Computers Access control Evaluation Congresses Zugriffskontrolle Softwareschwachstelle Kryptoanalyse Eindringerkennung Malware Konferenzschrift 2005 Wien |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT julischklaus detectionofintrusionsandmalwareandvulnerabilityassessmentsecondinternationalconferencedimva2005viennaaustriajuly782005proceedings AT dimvawien detectionofintrusionsandmalwareandvulnerabilityassessmentsecondinternationalconferencedimva2005viennaaustriajuly782005proceedings |