LEADER 01511nam--2200421---450- 001 990000365520203316 035 $a0036552 035 $aUSA010036552 035 $a(ALEPH)000036552USA01 035 $a0036552 100 $a20010319d1974----km-y0itay0103----ba 101 $aeng 102 $aNL 105 $a||||||||001yy 200 1 $aProceedings of the SHARE working conference on data base managenent system$eMontreal (Canada),23/27 July, 1973$gDonald A. Jardine 210 $aAmsterdam$cNorth Holland$d1974 215 $aIX, 279 p.$cill.$d22 cm 410 $12001 461 1$1001-------$12001 610 0 $aData Base Management$xCongressi$z1973 610 0$aCongressi$yMontreal$z1973 676 $a001.6442 710 12$aProceedings of the SHARE Working Conference on Data Base Management System. $0543798 801 0$aIT$bsalbc$gISBD 912 $a990000365520203316 951 $a001.644 2 PRO A$b0003122 CBS$c001.644 2$d00106116 951 $a001.644 2 PRO B$a0005557 CBS$a001.644 2$a00106117 959 $aBK 969 $aSCI 979 $aPATTY$b90$c20010319$lUSA01$h1308 979 $aPATTY$b90$c20010320$lUSA01$h1024 979 $aPATTY$b90$c20010320$lUSA01$h1745 979 $aPATTY$b90$c20010320$lUSA01$h1745 979 $aALANDI$b90$c20010516$lUSA01$h1127 979 $c20020403$lUSA01$h1644 979 $aPATRY$b90$c20040406$lUSA01$h1625 996 $aProceedings of the SHARE working conference on data base managenent system$9877183 997 $aUNISA LEADER 04014nam 22008535 450 001 996466220703316 005 20200629161552.0 010 $a3-319-26362-5 024 7 $a10.1007/978-3-319-26362-5 035 $a(CKB)4340000000001204 035 $a(SSID)ssj0001585508 035 $a(PQKBManifestationID)16263510 035 $a(PQKBTitleCode)TC0001585508 035 $a(PQKBWorkID)14864891 035 $a(PQKB)11285443 035 $a(DE-He213)978-3-319-26362-5 035 $a(MiAaPQ)EBC6281779 035 $a(MiAaPQ)EBC5579302 035 $a(Au-PeEL)EBL5579302 035 $a(OCoLC)932170252 035 $a(PPN)190529482 035 $a(EXLCZ)994340000000001204 100 $a20151026d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aResearch in Attacks, Intrusions, and Defenses$b[electronic resource] $e18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings /$fedited by Herbert Bos, Fabian Monrose, Gregory Blanc 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIII, 638 p. 147 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9404 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-26361-7 330 $aThis book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses. 410 0$aSecurity and Cryptology ;$v9404 606 $aApplication software 606 $aSoftware engineering 606 $aAlgorithms 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aSoftware Engineering. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aBos$b Herbert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMonrose$b Fabian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBlanc$b Gregory$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466220703316 996 $aResearch in Attacks, Intrusions, and Defenses$91912512 997 $aUNISA