00731nam0-22002771i-450-99000162097040332120050225084431.0000162097FED01000162097(Aleph)000162097FED0100016209720030910d1908----km-y0itay50------bafre<<La >>conquete mineraleL. de Launay.ParisFlammarion1908389 p.19 cmMineralogia549Launay,Louis de<1860-1938>285878ITUNINARICAUNIMARCBK99000162097040332160 549 C 523992FAGBCFAGBCConquete minerale369931UNINA04240nam 22009015 450 991044724010332120251113211221.0981-334-922-010.1007/978-981-33-4922-3(CKB)4100000011728434(DE-He213)978-981-33-4922-3(MiAaPQ)EBC6458353(Au-PeEL)EBL6458353(OCoLC)1232278670(oapen)https://directory.doabooks.org/handle/20.500.12854/63624(PPN)253253640(oapen)doab63624(EXLCZ)99410000001172843420210118d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierCyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou1st ed. 2020.Singapore :Springer Nature Singapore :Imprint: Springer,2020.1 online resource (X, 235 p. 108 illus., 70 illus. in color.) Communications in Computer and Information Science,1865-0937 ;1299981-334-921-2 Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.Communications in Computer and Information Science,1865-0937 ;1299Data protectionComputer networksApplication softwareComputer systemsCryptographyData encryption (Computer science)Computer networksSecurity measuresData and Information SecurityComputer Communication NetworksComputer and Information Systems ApplicationsComputer System ImplementationCryptologyMobile and Network SecurityData protection.Computer networks.Application software.Computer systems.Cryptography.Data encryption (Computer science).Computer networksSecurity measures.Data and Information Security.Computer Communication Networks.Computer and Information Systems Applications.Computer System Implementation.Cryptology.Mobile and Network Security.005.8Lu Weiedt955719Lu Weiedthttp://id.loc.gov/vocabulary/relators/edtWen Qiaoyanedthttp://id.loc.gov/vocabulary/relators/edtZhang Yuqingedthttp://id.loc.gov/vocabulary/relators/edtLang Boedthttp://id.loc.gov/vocabulary/relators/edtWen Weipingedthttp://id.loc.gov/vocabulary/relators/edtYan Hanbingedthttp://id.loc.gov/vocabulary/relators/edtLi Chaoedthttp://id.loc.gov/vocabulary/relators/edtDing Liedthttp://id.loc.gov/vocabulary/relators/edtLi Ruiguangedthttp://id.loc.gov/vocabulary/relators/edtZhou Yuedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910447240103321Cyber Security3358412UNINA