000 | 02044nmm a22004695u 4500 | ||
---|---|---|---|
001 | vtls000354184 | ||
003 | RU-ToGU | ||
005 | 20210922022807.0 | ||
007 | cr nn 008mamaa | ||
008 | 120828s2008 xx j eng d | ||
020 | _a9780387773223 | ||
035 | _ato000354184 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
100 | 1 |
_aStolfo, Salvatore J. _9310578 |
|
245 | 1 | 0 |
_aInsider Attack and Cyber Security _hЭлектронный ресурс _bBeyond the Hacker / _cedited by Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair. |
260 |
_aBoston, MA : _bSpringer Science+Business Media, LLC, _c2008. |
||
490 | 1 | 0 |
_aAdvances in Information Security, _x1568-2663 ; _v39 |
650 | 0 |
_aComputer Communication Networks _9566243 |
|
650 | 0 |
_aComputer network architectures _9566231 |
|
650 | 0 |
_aData encryption (Computer science) _9566260 |
|
650 | 0 |
_aData protection _9303937 |
|
650 | 0 |
_aData structures (Computer science) _9566232 |
|
650 | 0 |
_aInformation systems _9303226 |
|
650 | 1 | 4 |
_aComputer Science _9155490 |
650 | 2 | 4 |
_aComputer Communication Networks _9566243 |
650 | 2 | 4 |
_aComputer Systems Organization and Communication Networks _9566233 |
650 | 2 | 4 |
_aData Encryption _9566261 |
650 | 2 | 4 |
_aData Structures, Cryptology and Information Theory _9566234 |
650 | 2 | 4 |
_aInformation Systems Applications (incl.Internet) _9304235 |
650 | 2 | 4 |
_aSystems and Data Security _9303939 |
700 | 1 |
_aBellovin, Steven M. _9310580 |
|
700 | 1 |
_aHershkop, Shlomo. _9310581 |
|
700 | 1 |
_aKeromytis, Angelos D. _9303106 |
|
700 | 1 |
_aSinclair, Sara. _9310582 |
|
700 | 1 |
_aSmith, Sean W. _9308283 |
|
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
830 |
_aAdvances in Information Security, _9566262 |
||
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-0-387-77322-3 |
999 | _c230700 |