Insider attack and cyber security: beyond the hacker
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , , , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Springer
[2008]
|
Schriftenreihe: | Advances in information security
Volume 39 |
Schlagworte: | |
Online-Zugang: | FHM01 UBG01 UBT01 UBY01 UPA01 Volltext |
Beschreibung: | "Proceedings of the first Workshop on Insider Attack and Cyber Security held in Washington DC in June 2007"...Pref. - Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xi, 222 Seiten) Illustrationen 25 cm |
ISBN: | 9780387773223 |
DOI: | 10.1007/978-0-387-77322-3 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV049069848 | ||
003 | DE-604 | ||
005 | 20231018 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 230727s2008 xxu|||| o||u| ||||||eng d | ||
010 | |a 008921346 | ||
020 | |a 9780387773223 |9 978-0-387-77322-3 | ||
024 | 7 | |a 10.1007/978-0-387-77322-3 |2 doi | |
035 | |a (OCoLC)1392139880 | ||
035 | |a (DE-599)BVBBV049069848 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-473 |a DE-M347 |a DE-703 |a DE-706 |a DE-355 |a DE-634 |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
111 | 2 | |a Workshop on Insider Attack and Cyber Security |j Verfasser |4 aut | |
245 | 1 | 0 | |a Insider attack and cyber security |b beyond the hacker |c [edited] by Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis and Sara Sinclair, Sean W. Smith |
264 | 1 | |a New York |b Springer |c [2008] | |
300 | |a 1 Online-Ressource (xi, 222 Seiten) |b Illustrationen |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v Volume 39 | |
500 | |a "Proceedings of the first Workshop on Insider Attack and Cyber Security held in Washington DC in June 2007"...Pref. - Includes bibliographical references and index | ||
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
650 | 4 | |a Cyberterrorism |x Prevention |v Congresses | |
650 | 4 | |a Computer crimes |v Congresses | |
650 | 4 | |a Hackers |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2007 |z Washington, DC |2 gnd-content | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Stolfo, Salvatore J. |0 (DE-588)134280008 |4 edt | |
700 | 1 | |a Bellovin, Steven M. |0 (DE-588)113973233 |4 edt | |
700 | 1 | |a Hershkop, Shlomo |4 edt | |
700 | 1 | |a Keromytis, Angelos D. |0 (DE-588)1053923716 |4 edt | |
700 | 1 | |a Sinclair, Sara |4 edt | |
700 | 1 | |a Smith, Sean W. |d 1964- |0 (DE-588)142168386 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-387-77321-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-4419-4589-1 |
830 | 0 | |a Advances in information security |v Volume 39 |w (DE-604)BV022281064 |9 39 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-77322-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2008 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034331828 | ||
966 | e | |u https://doi.org/10.1007/978-0-387-77322-3 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-77322-3 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-77322-3 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-77322-3 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-77322-3 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185383386218496 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Stolfo, Salvatore J. Bellovin, Steven M. Hershkop, Shlomo Keromytis, Angelos D. Sinclair, Sara Smith, Sean W. 1964- |
author2_role | edt edt edt edt edt edt |
author2_variant | s j s sj sjs s m b sm smb s h sh a d k ad adk s s ss s w s sw sws |
author_GND | (DE-588)134280008 (DE-588)113973233 (DE-588)1053923716 (DE-588)142168386 |
author_corporate | Workshop on Insider Attack and Cyber Security |
author_corporate_role | aut |
author_facet | Stolfo, Salvatore J. Bellovin, Steven M. Hershkop, Shlomo Keromytis, Angelos D. Sinclair, Sara Smith, Sean W. 1964- Workshop on Insider Attack and Cyber Security |
author_sort | Workshop on Insider Attack and Cyber Security |
building | Verbundindex |
bvnumber | BV049069848 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)1392139880 (DE-599)BVBBV049069848 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-0-387-77322-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02977nmm a2200637 cb4500</leader><controlfield tag="001">BV049069848</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231018 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230727s2008 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">008921346</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387773223</subfield><subfield code="9">978-0-387-77322-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-77322-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1392139880</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049069848</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Workshop on Insider Attack and Cyber Security</subfield><subfield code="j">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Insider attack and cyber security</subfield><subfield code="b">beyond the hacker</subfield><subfield code="c">[edited] by Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis and Sara Sinclair, Sean W. Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Springer</subfield><subfield code="c">[2008]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 222 Seiten)</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">Volume 39</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the first Workshop on Insider Attack and Cyber Security held in Washington DC in June 2007"...Pref. - Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2007</subfield><subfield code="z">Washington, DC</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stolfo, Salvatore J.</subfield><subfield code="0">(DE-588)134280008</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bellovin, Steven M.</subfield><subfield code="0">(DE-588)113973233</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hershkop, Shlomo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Keromytis, Angelos D.</subfield><subfield code="0">(DE-588)1053923716</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sinclair, Sara</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Sean W.</subfield><subfield code="d">1964-</subfield><subfield code="0">(DE-588)142168386</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-387-77321-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-4419-4589-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">Volume 39</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">39</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-77322-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2008</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034331828</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-77322-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-77322-3</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-77322-3</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-77322-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-77322-3</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2007 Washington, DC gnd-content (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Konferenzschrift 2007 Washington, DC Aufsatzsammlung |
id | DE-604.BV049069848 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:26:45Z |
indexdate | 2024-07-10T09:54:22Z |
institution | BVB |
isbn | 9780387773223 |
language | English |
lccn | 008921346 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034331828 |
oclc_num | 1392139880 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-703 DE-706 DE-355 DE-BY-UBR DE-634 DE-739 |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-703 DE-706 DE-355 DE-BY-UBR DE-634 DE-739 |
physical | 1 Online-Ressource (xi, 222 Seiten) Illustrationen 25 cm |
psigel | ZDB-2-SCS ZDB-2-SCS_2008 |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Workshop on Insider Attack and Cyber Security Verfasser aut Insider attack and cyber security beyond the hacker [edited] by Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis and Sara Sinclair, Sean W. Smith New York Springer [2008] 1 Online-Ressource (xi, 222 Seiten) Illustrationen 25 cm txt rdacontent c rdamedia cr rdacarrier Advances in information security Volume 39 "Proceedings of the first Workshop on Insider Attack and Cyber Security held in Washington DC in June 2007"...Pref. - Includes bibliographical references and index Computer security Congresses Computer networks Security measures Congresses Cyberterrorism Prevention Congresses Computer crimes Congresses Hackers Congresses (DE-588)1071861417 Konferenzschrift 2007 Washington, DC gnd-content (DE-588)4143413-4 Aufsatzsammlung gnd-content Stolfo, Salvatore J. (DE-588)134280008 edt Bellovin, Steven M. (DE-588)113973233 edt Hershkop, Shlomo edt Keromytis, Angelos D. (DE-588)1053923716 edt Sinclair, Sara edt Smith, Sean W. 1964- (DE-588)142168386 edt Erscheint auch als Druck-Ausgabe, Hardcover 978-0-387-77321-6 Erscheint auch als Druck-Ausgabe, Paperback 978-1-4419-4589-1 Advances in information security Volume 39 (DE-604)BV022281064 39 https://doi.org/10.1007/978-0-387-77322-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Insider attack and cyber security beyond the hacker Advances in information security Computer security Congresses Computer networks Security measures Congresses Cyberterrorism Prevention Congresses Computer crimes Congresses Hackers Congresses |
subject_GND | (DE-588)1071861417 (DE-588)4143413-4 |
title | Insider attack and cyber security beyond the hacker |
title_auth | Insider attack and cyber security beyond the hacker |
title_exact_search | Insider attack and cyber security beyond the hacker |
title_exact_search_txtP | Insider attack and cyber security beyond the hacker |
title_full | Insider attack and cyber security beyond the hacker [edited] by Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis and Sara Sinclair, Sean W. Smith |
title_fullStr | Insider attack and cyber security beyond the hacker [edited] by Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis and Sara Sinclair, Sean W. Smith |
title_full_unstemmed | Insider attack and cyber security beyond the hacker [edited] by Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis and Sara Sinclair, Sean W. Smith |
title_short | Insider attack and cyber security |
title_sort | insider attack and cyber security beyond the hacker |
title_sub | beyond the hacker |
topic | Computer security Congresses Computer networks Security measures Congresses Cyberterrorism Prevention Congresses Computer crimes Congresses Hackers Congresses |
topic_facet | Computer security Congresses Computer networks Security measures Congresses Cyberterrorism Prevention Congresses Computer crimes Congresses Hackers Congresses Konferenzschrift 2007 Washington, DC Aufsatzsammlung |
url | https://doi.org/10.1007/978-0-387-77322-3 |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT workshoponinsiderattackandcybersecurity insiderattackandcybersecuritybeyondthehacker AT stolfosalvatorej insiderattackandcybersecuritybeyondthehacker AT bellovinstevenm insiderattackandcybersecuritybeyondthehacker AT hershkopshlomo insiderattackandcybersecuritybeyondthehacker AT keromytisangelosd insiderattackandcybersecuritybeyondthehacker AT sinclairsara insiderattackandcybersecuritybeyondthehacker AT smithseanw insiderattackandcybersecuritybeyondthehacker |