String analysis for software verification and security:
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schlagworte: | |
Beschreibung: | ix, 174 Seiten Diagramme |
ISBN: | 9783319886374 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046738631 | ||
003 | DE-604 | ||
005 | 20201001 | ||
007 | t | ||
008 | 200527s2017 |||| |||| 00||| eng d | ||
020 | |a 9783319886374 |9 978-3-319-88637-4 | ||
035 | |a (OCoLC)1199065183 | ||
035 | |a (DE-599)BVBBV046738631 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 233 |0 (DE-625)143620: |2 rvk | ||
100 | 1 | |a Bultan, Tevfik |e Verfasser |4 aut | |
245 | 1 | 0 | |a String analysis for software verification and security |c Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin |
264 | 1 | |a Cham |b Springer |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a ix, 174 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Programming languages (Electronic computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer logic | |
650 | 4 | |a Mathematical logic | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Programming Languages, Compilers, Interpreters | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Logics and Meanings of Programs | |
650 | 4 | |a Mathematical Logic and Formal Languages | |
650 | 4 | |a Symbolic and Algebraic Manipulation | |
700 | 1 | |a Yu, Fang |e Verfasser |4 aut | |
700 | 1 | |a Alkhalaf, Muath |e Verfasser |4 aut | |
700 | 1 | |a Aydin, Abdulbaki |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-68670-7 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032148579 |
Datensatz im Suchindex
_version_ | 1804181489399627776 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bultan, Tevfik Yu, Fang Alkhalaf, Muath Aydin, Abdulbaki |
author_facet | Bultan, Tevfik Yu, Fang Alkhalaf, Muath Aydin, Abdulbaki |
author_role | aut aut aut aut |
author_sort | Bultan, Tevfik |
author_variant | t b tb f y fy m a ma a a aa |
building | Verbundindex |
bvnumber | BV046738631 |
classification_rvk | ST 233 |
ctrlnum | (OCoLC)1199065183 (DE-599)BVBBV046738631 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01675nam a2200505 c 4500</leader><controlfield tag="001">BV046738631</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201001 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200527s2017 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319886374</subfield><subfield code="9">978-3-319-88637-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1199065183</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046738631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bultan, Tevfik</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">String analysis for software verification and security</subfield><subfield code="c">Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">ix, 174 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming languages (Electronic computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer logic</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical logic</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Languages, Compilers, Interpreters</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logics and Meanings of Programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical Logic and Formal Languages</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Symbolic and Algebraic Manipulation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Fang</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alkhalaf, Muath</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aydin, Abdulbaki</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-68670-7</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032148579</subfield></datafield></record></collection> |
id | DE-604.BV046738631 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:38:40Z |
indexdate | 2024-07-10T08:52:28Z |
institution | BVB |
isbn | 9783319886374 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032148579 |
oclc_num | 1199065183 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | ix, 174 Seiten Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
spelling | Bultan, Tevfik Verfasser aut String analysis for software verification and security Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin Cham Springer [2017] © 2017 ix, 174 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Computer science Software engineering Programming languages (Electronic computers) Computer security Computer logic Mathematical logic Computer science / Mathematics Computer Science Systems and Data Security Programming Languages, Compilers, Interpreters Software Engineering Logics and Meanings of Programs Mathematical Logic and Formal Languages Symbolic and Algebraic Manipulation Yu, Fang Verfasser aut Alkhalaf, Muath Verfasser aut Aydin, Abdulbaki Verfasser aut Erscheint auch als Online-Ausgabe 978-3-319-68670-7 |
spellingShingle | Bultan, Tevfik Yu, Fang Alkhalaf, Muath Aydin, Abdulbaki String analysis for software verification and security Computer science Software engineering Programming languages (Electronic computers) Computer security Computer logic Mathematical logic Computer science / Mathematics Computer Science Systems and Data Security Programming Languages, Compilers, Interpreters Software Engineering Logics and Meanings of Programs Mathematical Logic and Formal Languages Symbolic and Algebraic Manipulation |
title | String analysis for software verification and security |
title_auth | String analysis for software verification and security |
title_exact_search | String analysis for software verification and security |
title_exact_search_txtP | String analysis for software verification and security |
title_full | String analysis for software verification and security Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin |
title_fullStr | String analysis for software verification and security Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin |
title_full_unstemmed | String analysis for software verification and security Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin |
title_short | String analysis for software verification and security |
title_sort | string analysis for software verification and security |
topic | Computer science Software engineering Programming languages (Electronic computers) Computer security Computer logic Mathematical logic Computer science / Mathematics Computer Science Systems and Data Security Programming Languages, Compilers, Interpreters Software Engineering Logics and Meanings of Programs Mathematical Logic and Formal Languages Symbolic and Algebraic Manipulation |
topic_facet | Computer science Software engineering Programming languages (Electronic computers) Computer security Computer logic Mathematical logic Computer science / Mathematics Computer Science Systems and Data Security Programming Languages, Compilers, Interpreters Software Engineering Logics and Meanings of Programs Mathematical Logic and Formal Languages Symbolic and Algebraic Manipulation |
work_keys_str_mv | AT bultantevfik stringanalysisforsoftwareverificationandsecurity AT yufang stringanalysisforsoftwareverificationandsecurity AT alkhalafmuath stringanalysisforsoftwareverificationandsecurity AT aydinabdulbaki stringanalysisforsoftwareverificationandsecurity |