LEADER 01232nam 2200409 450 001 9910796997703321 005 20230807194325.0 010 $a1-4677-9784-7 035 $a(CKB)4100000005115847 035 $a(MiAaPQ)EBC5444185 035 $a(Au-PeEL)EBL5444185 035 $a(CaPaEBR)ebr11590146 035 $a(OCoLC)969006505 035 $a(EXLCZ)994100000005115847 100 $a20190119d2015 uy 1 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe legend of Sleepy Hollow /$fby Washington Irving 210 1$aMinneapolis, Minnesota :$cFirst Avenue Editions,$d2015. 215 $a1 online resource (32 pages) $cillustrations 225 0 $aFamous legends 320 $aIncludes bibliographical references (page 31) and index. 606 $aGhost stories 607 $aNew York (State)$xHistory$y1775-1865$vFiction 615 0$aGhost stories. 676 $a398.4 700 $aIrving$b Washington$f1783-1859,$0138711 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910796997703321 996 $aThe Legend of Sleepy Hollow$92623480 997 $aUNINA LEADER 03580nam 22008055 450 001 9910349407303321 005 20251225203611.0 010 $a9783030004705 010 $a3030004708 024 7 $a10.1007/978-3-030-00470-5 035 $a(CKB)4100000006374689 035 $a(DE-He213)978-3-030-00470-5 035 $a(MiAaPQ)EBC6241666 035 $a(PPN)230538665 035 $a(EXLCZ)994100000006374689 100 $a20180906d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aResearch in Attacks, Intrusions, and Defenses $e21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings /$fedited by Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIV, 712 p. 162 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11050 311 08$a9783030004699 311 08$a3030004694 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11050 606 $aData protection 606 $aComputers and civilization 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aApplication software 606 $aOperating systems (Computers) 606 $aComputer networks 606 $aData and Information Security 606 $aComputers and Society 606 $aLegal Aspects of Computing 606 $aComputer and Information Systems Applications 606 $aOperating Systems 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputers and civilization. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aApplication software. 615 0$aOperating systems (Computers). 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aComputer and Information Systems Applications. 615 24$aOperating Systems. 615 24$aComputer Communication Networks. 676 $a005.8 676 $a005.7 702 $aBailey$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHolz$b Thorsten$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStamatogiannakis$b Manolis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIoannidis$b Sotiris$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349407303321 996 $aResearch in Attacks, Intrusions, and Defenses$91912512 997 $aUNINA