Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2007
Schriftenreihe:Lecture Notes in Computer Science 4579
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV022537233
003 DE-604
005 20161212
007 t|
008 070731s2007 gw ad|| |||| 10||| eng d
015 |a 07,N29,0029  |2 dnb 
016 7 |a 984686754  |2 DE-101 
020 |a 9783540736134  |c : EUR 48.15 (freier Pr.), sfr 78.50 (freier Pr.)  |9 978-3-540-73613-4 
020 |a 3540736131  |c : EUR 48.15 (freier Pr.), sfr 78.50 (freier Pr.)  |9 3-540-73613-1 
024 3 |a 9783540736134 
028 5 2 |a 12089918 
035 |a (OCoLC)634852655 
035 |a (DE-599)DNB984686754 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-91G  |a DE-706  |a DE-83  |a DE-11 
082 0 |a 005.8  |2 22/ger 
084 |a 004  |2 sdnb 
084 |a DAT 460f  |2 stub 
245 1 0 |a Detection of intrusions and malware, and vulnerability assessment  |b 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings  |c Bernhard Hämmerli ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2007 
300 |a X, 250 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 4579 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Malware  |0 (DE-588)4687059-3  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2007  |z Luzern  |2 gnd-content 
689 0 0 |a Malware  |0 (DE-588)4687059-3  |D s 
689 0 |5 DE-604 
689 1 0 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 1 |5 DE-604 
689 2 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 2 |5 DE-604 
689 3 0 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |D s 
689 3 |5 DE-604 
689 4 0 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 4 |5 DE-604 
700 1 |a Hämmerli, Bernhard M.  |d 1958-  |e Sonstige  |0 (DE-588)133407209  |4 oth 
711 2 |a DIMVA  |n 4  |d 2007  |c Luzern  |j Sonstige  |0 (DE-588)6066168-9  |4 oth 
830 0 |a Lecture Notes in Computer Science  |v 4579  |w (DE-604)BV000000607  |9 4579 
943 1 |a oai:aleph.bib-bvb.de:BVB01-015743728 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1601910
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040010258894
_version_ 1822409023527321600
adam_text
any_adam_object
author_GND (DE-588)133407209
building Verbundindex
bvnumber BV022537233
classification_rvk SS 4800
classification_tum DAT 460f
ctrlnum (OCoLC)634852655
(DE-599)DNB984686754
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV022537233</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161212</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">070731s2007 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">07,N29,0029</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">984686754</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540736134</subfield><subfield code="c">: EUR 48.15 (freier Pr.), sfr 78.50 (freier Pr.)</subfield><subfield code="9">978-3-540-73613-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540736131</subfield><subfield code="c">: EUR 48.15 (freier Pr.), sfr 78.50 (freier Pr.)</subfield><subfield code="9">3-540-73613-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540736134</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12089918</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)634852655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB984686754</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of intrusions and malware, and vulnerability assessment</subfield><subfield code="b">4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings</subfield><subfield code="c">Bernhard Hämmerli ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 250 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">4579</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2007</subfield><subfield code="z">Luzern</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hämmerli, Bernhard M.</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)133407209</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">DIMVA</subfield><subfield code="n">4</subfield><subfield code="d">2007</subfield><subfield code="c">Luzern</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)6066168-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">4579</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">4579</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015743728</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2007 Luzern gnd-content
genre_facet Konferenzschrift 2007 Luzern
id DE-604.BV022537233
illustrated Illustrated
indexdate 2025-01-27T13:31:19Z
institution BVB
institution_GND (DE-588)6066168-9
isbn 9783540736134
3540736131
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-015743728
oclc_num 634852655
open_access_boolean
owner DE-91G
DE-BY-TUM
DE-706
DE-83
DE-11
owner_facet DE-91G
DE-BY-TUM
DE-706
DE-83
DE-11
physical X, 250 S. Ill., graph. Darst.
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spelling Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings Bernhard Hämmerli ... (eds.)
Berlin [u.a.] Springer 2007
X, 250 S. Ill., graph. Darst.
txt rdacontent
n rdamedia
nc rdacarrier
Lecture Notes in Computer Science 4579
Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf
Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf
Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf
Eindringerkennung (DE-588)4706627-1 gnd rswk-swf
Malware (DE-588)4687059-3 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift 2007 Luzern gnd-content
Malware (DE-588)4687059-3 s
DE-604
Eindringerkennung (DE-588)4706627-1 s
Kryptoanalyse (DE-588)4830502-9 s
Softwareschwachstelle (DE-588)4752508-3 s
Zugriffskontrolle (DE-588)4293034-0 s
Hämmerli, Bernhard M. 1958- Sonstige (DE-588)133407209 oth
DIMVA 4 2007 Luzern Sonstige (DE-588)6066168-9 oth
Lecture Notes in Computer Science 4579 (DE-604)BV000000607 4579
spellingShingle Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings
Lecture Notes in Computer Science
Zugriffskontrolle (DE-588)4293034-0 gnd
Softwareschwachstelle (DE-588)4752508-3 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Malware (DE-588)4687059-3 gnd
subject_GND (DE-588)4293034-0
(DE-588)4752508-3
(DE-588)4830502-9
(DE-588)4706627-1
(DE-588)4687059-3
(DE-588)1071861417
title Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings
title_auth Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings
title_exact_search Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings
title_full Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings Bernhard Hämmerli ... (eds.)
title_fullStr Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings Bernhard Hämmerli ... (eds.)
title_full_unstemmed Detection of intrusions and malware, and vulnerability assessment 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings Bernhard Hämmerli ... (eds.)
title_short Detection of intrusions and malware, and vulnerability assessment
title_sort detection of intrusions and malware and vulnerability assessment 4th international conference dimva 2007 lucerne switzerland july 12 13 2007 proceedings
title_sub 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings
topic Zugriffskontrolle (DE-588)4293034-0 gnd
Softwareschwachstelle (DE-588)4752508-3 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Malware (DE-588)4687059-3 gnd
topic_facet Zugriffskontrolle
Softwareschwachstelle
Kryptoanalyse
Eindringerkennung
Malware
Konferenzschrift 2007 Luzern
volume_link (DE-604)BV000000607
work_keys_str_mv AT hammerlibernhardm detectionofintrusionsandmalwareandvulnerabilityassessment4thinternationalconferencedimva2007lucerneswitzerlandjuly12132007proceedings
AT dimvaluzern detectionofintrusionsandmalwareandvulnerabilityassessment4thinternationalconferencedimva2007lucerneswitzerlandjuly12132007proceedings