LEADER 02935nam 22006135 450 001 9910484085003321 005 20251226195221.0 010 $a3-319-11212-0 024 7 $a10.1007/978-3-319-11212-1 035 $a(MiAaPQ)EBC5586502 035 $a(MiAaPQ)EBC6282944 035 $a(PPN)180626477 035 $a(CKB)3710000000227401 035 $a(BIP)52465737 035 $a(DE-He213)978-3-319-11212-1 035 $a(EXLCZ)993710000000227401 100 $a20140814d2014 u| 0 101 0 $aeng 135 $aurnn#||8mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security - ESORICS 2014 $e19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II /$fedited by Miroslaw Kutylowski, Jaideep Vaidya 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $axvi, 516p ;$cill 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8713 300 $aIncludes index. 327 $aCryptography, formal methods and theory of security -- Security services -- Intrusion/anomaly detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database and storage security -- Software and application security -- Human and societal aspects of security and privacy. 330 $aThe two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8713 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aCryptology 606 $aIT Operations 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aIT Operations. 676 $a005.8 701 $aKutylowski$b Miroslaw$01350545 701 $aVaidya$b Jaideep$01276751 801 0$bMiAaPQ 801 2$bta 906 $aBOOK 912 $a9910484085003321 996 $aComputer Security - ESORICS 2014$93088786 997 $aUNINA