LEADER 01685nam 2200553Ia 450 001 9910785879503321 005 20220829191309.0 010 $a1-283-59815-9 010 $a9786613910608 010 $a1-61117-205-5 035 $a(CKB)2670000000246246 035 $a(OCoLC)810125005 035 $a(CaPaEBR)ebrary10602537 035 $a(SSID)ssj0000711336 035 $a(PQKBManifestationID)11416635 035 $a(PQKBTitleCode)TC0000711336 035 $a(PQKBWorkID)10693836 035 $a(PQKB)10137083 035 $a(MdBmJHUP)muse29332 035 $a(Au-PeEL)EBL2054822 035 $a(CaPaEBR)ebr10602537 035 $a(CaONFJC)MIL391060 035 $a(OCoLC)910069379 035 $a(MiAaPQ)EBC2054822 035 $a(EXLCZ)992670000000246246 100 $a20101214d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGleaning Ruth$b[electronic resource] $ea biblical heroine and her afterlives /$fJennifer L. Koosed 210 $aColumbia, S.C. $cUniversity of South Carolina Press$d2011 215 $a1 online resource (188 p.) 225 0 $aStudies on personalities of the Old Testament 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-57003-983-6 320 $aIncludes bibliographical references (p. 155-161) and indexes. 606 $aWomen in the Bible 615 0$aWomen in the Bible. 676 $a222/.3506 700 $aKoosed$b Jennifer L$01469118 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785879503321 996 $aGleaning Ruth$93680551 997 $aUNINA LEADER 05424nam 22008775 450 001 9910485030003321 005 20251226202745.0 010 $a1-280-38778-5 010 $a9786613565709 010 $a3-642-14215-X 024 7 $a10.1007/978-3-642-14215-4 035 $a(CKB)2670000000028937 035 $a(SSID)ssj0000446416 035 $a(PQKBManifestationID)11285481 035 $a(PQKBTitleCode)TC0000446416 035 $a(PQKBWorkID)10497002 035 $a(PQKB)10096323 035 $a(DE-He213)978-3-642-14215-4 035 $a(MiAaPQ)EBC3065497 035 $a(PPN)149072902 035 $a(BIP)31169058 035 $a(EXLCZ)992670000000028937 100 $a20100702d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment $e7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings /$fedited by Christian Kreibich, Marko Jahnke 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XII, 219 p. 55 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6201 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-14214-1 320 $aIncludes bibliographical references and index. 327 $aHost Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis ? Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can?t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS ? Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks. 330 $aOn behalf of the Programand Steering Committees it is our pleasure to present to you the proceedings of the 7th GI International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), documenting the work presented at the conference this year. As in the past, the conference broughttogetherinternationalexpertsfromacademia,industry,andgovernment to present and discuss novel security research. Thisyearthe27membersoftheProgramCommitteereceived34submissions from 18 countries. The committee, selected to represent a balanced mixture of both mature and young excellence in the ?eld, honesty, and good judgement, carefully reviewed and evaluated all submissions at least threefold, according to scienti'c novelty, relevance, and technical quality. The ?nal selection took place on March 29, 2010 at the Technische Universitat ¨ Munc ¨ hen, Germany. In the end, we accepted 12 papers for publication and presentation at the conference, including two extended abstracts. DIMVA 2010took placeatthe Centre ofSciences in Bonn,Germany,onJuly 8 and 9. The program featured work from a wide range of topics in security, grouped into ?ve sessions that are re'ected in the chapters of the proceedings you are now reading. In addition, the conference featured three invited talks which greatly contributed to the event. We are very grateful to Jos´ e Nazario (Arbor Networks), Carel van Straaten (Spamhaus), and Marc Dacier (Sym- tec/Eurecom) for their insightful and entertaining presentations. Thanks also to Sven Dietrich (Stevens Institute of Technology) for once again organizing and hosting the rump session, which contained a diverse range of forthcoming work. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6201 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aApplication software 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aComputers and Society 606 $aComputer and Information Systems Applications 606 $aAlgorithms 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aAlgorithms. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aComputer and Information Systems Applications. 615 24$aAlgorithms. 676 $a005.8 701 $aKreibich$b Christian$01759271 701 $aJahnke$b Marko$01759272 712 12$aDIMVA 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485030003321 996 $aDetection of intrusions and malware, and vulnerability assessment$94197686 997 $aUNINA