LEADER 01440oam 2200409 450 001 9910712015303321 005 20190412111628.0 035 $a(CKB)5470000002489953 035 $a(OCoLC)1096435021 035 $a(EXLCZ)995470000002489953 100 $a20190412d2013 ua 0 101 0 $aspa 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNueve entrada de seguridad para el cerebro en be?isbol $eatencio?n be?isbol para entrenadores y padres 210 1$a[Bethesda, Md.] :$cConsumer Product Safety Commission ;$a[Atlanta, Ga.] :$cCenters for Disease Control and Prevention,$d2013. 215 $a1 online resource (2 unnumbered pages) $ccolor illustrations 225 1 $aPub. ;$v347 300 $a"052013." 517 3 $aAtencio?n be?isbol para entrenadores y padres 606 $aBaseball$xEquipment and supplies 606 $aBaseball players$xSafety measures 606 $aHelmets 615 0$aBaseball$xEquipment and supplies. 615 0$aBaseball players$xSafety measures. 615 0$aHelmets. 712 02$aU.S. Consumer Product Safety Commission, 712 02$aCenters for Disease Control and Prevention (U.S.), 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910712015303321 996 $aNueve entrada de seguridad para el cerebro en be?isbol$93522168 997 $aUNINA LEADER 06353nam 22007575 450 001 9910299227303321 005 20251226193419.0 010 $a3-319-18467-9 024 7 $a10.1007/978-3-319-18467-8 035 $a(CKB)3710000000416829 035 $a(SSID)ssj0001501000 035 $a(PQKBManifestationID)11904649 035 $a(PQKBTitleCode)TC0001501000 035 $a(PQKBWorkID)11522327 035 $a(PQKB)10737624 035 $a(DE-He213)978-3-319-18467-8 035 $a(MiAaPQ)EBC6301954 035 $a(MiAaPQ)EBC5576509 035 $a(Au-PeEL)EBL5576509 035 $a(OCoLC)909266449 035 $a(PPN)186030312 035 $a(EXLCZ)993710000000416829 100 $a20150508d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aICT Systems Security and Privacy Protection $e30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /$fedited by Hannes Federrath, Dieter Gollmann 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XVI, 646 p. 156 illus.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v455 300 $aIncludes index. 311 08$a3-319-18466-0 327 $aO-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet?s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. 330 $aThis book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v455 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aIT Operations 606 $aComputer Communication Networks 606 $aCryptology 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aFederrath$b Hannes$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299227303321 996 $aICT Systems Security and Privacy Protection$92034030 997 $aUNINA