LEADER 00993cam0-22003611i-450- 001 990000778220403321 005 20060523160129.0 035 $a000077822 035 $aFED01000077822 035 $a(Aleph)000077822FED01 035 $a000077822 100 $a20020821d1994----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aa-------001yy 200 1 $aMasserie del Salento$ftesto di Cesare Daquino$gfoto di Pierluigi Bolognini 210 $aCavallino di Lecce$cCapone$d1994 215 $a140 p.$cill.$d32 cm 610 0 $aSalento$aMasserie 610 0 $aMasserie$aSalento 676 $a728.8 676 $a728.6094575 700 1$aDaquino,$bCesare$039469 702 1$aBolognini,$bPierluigi 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000778220403321 952 $aSEZ.NA C 509$b6167/873$fFARBC 952 $aXI A 2362$b27000$fFSPBC 959 $aFARBC 959 $aFSPBC 996 $aMasserie del Salento$9351184 997 $aUNINA LEADER 04619nam 22007455 450 001 996466107403316 005 20200629171452.0 010 $a3-540-70542-2 024 7 $a10.1007/978-3-540-70542-0 035 $a(CKB)1000000000490499 035 $a(SSID)ssj0000317180 035 $a(PQKBManifestationID)11231536 035 $a(PQKBTitleCode)TC0000317180 035 $a(PQKBWorkID)10288920 035 $a(PQKB)10728206 035 $a(DE-He213)978-3-540-70542-0 035 $a(MiAaPQ)EBC3068567 035 $a(PPN)127054901 035 $a(EXLCZ)991000000000490499 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment$b[electronic resource] $e5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings /$fedited by Diego Zamboni 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (X, 279 p.) 225 1 $aSecurity and Cryptology ;$v5137 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-70541-4 320 $aIncludes bibliographical references and index. 327 $aAttack Prevention -- Data Space Randomization -- XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks -- VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges -- Malware Detection and Prevention (I) -- Dynamic Binary Instrumentation-Based Framework for Malware Defense -- Embedded Malware Detection Using Markov n-Grams -- Learning and Classification of Malware Behavior -- Attack Techniques and Vulnerability Assessment -- On Race Vulnerabilities in Web Applications -- On the Limits of Information Flow Techniques for Malware Analysis and Containment -- Malware Detection and Prevention (II) -- Expanding Malware Defense by Securing Software Installations -- FluXOR: Detecting and Monitoring Fast-Flux Service Networks -- Traffic Aggregation for Malware Detection -- Intrusion Detection and Activity Correlation -- The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors -- The Quest for Multi-headed Worms -- A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2008, held in Paris, France in July 2008. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on attack prevention, malware detection and prevention, attack techniques and vulnerability assessment, and intrusion detection and activity correlation. 410 0$aSecurity and Cryptology ;$v5137 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aComputer security 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.8 702 $aZamboni$b Diego$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aDIMVA 2008 906 $aBOOK 912 $a996466107403316 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$9772293 997 $aUNISA