جهت دسترسی به کاربرگه ی زیر، از این لینک استفاده کنید.
http://localhost/handle/Hannan/1350
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Batten, Lynn. ; | en_US |
| dc.contributor.author | Kim, Dong Seong. ; | en_US |
| dc.contributor.author | Zhang, Xuyun. ; | en_US |
| dc.contributor.author | Li, Gang. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:27:55Z | - |
| dc.date.available | 2020-05-17T08:27:55Z | - |
| dc.date.issued | 2017 | en_US |
| dc.identifier.isbn | 9789811054211 ; | en_US |
| dc.identifier.isbn | 9789811054204 (print) ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/1350 | - |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | QA76.9.A25 ; | en_US |
| dc.description | Printed edition: ; 9789811054204. ; | en_US |
| dc.description | 005.8 ; 23 ; | en_US |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description.abstract | This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security. ; | en_US |
| dc.description.statementofresponsibility | edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li. | en_US |
| dc.description.tableofcontents | Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. ; | en_US |
| dc.format.extent | XIV, 223 p. 68 illus. ; online resource. ; | en_US |
| dc.publisher | Springer Singapore : | en_US |
| dc.publisher | Imprint: Springer, | en_US |
| dc.relation.ispartofseries | Communications in Computer and Information Science, ; 1865-0929 ; ; 719. ; | en_US |
| dc.relation.ispartofseries | Communications in Computer and Information Science, ; 1865-0929 ; ; 719. ; | en_US |
| dc.relation.haspart | 9789811054211.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Data encryption (Computer science). ; | en_US |
| dc.subject | Algorithms | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.subject | Data Encryption. ; | en_US |
| dc.subject | Algorithm Analysis and Problem Complexity. ; | en_US |
| dc.title | Applications and Techniques in Information Security | en_US |
| dc.title.alternative | 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6ee7, 2017, Proceedings / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Singapore : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9789811054211.pdf | 12 MB | Adobe PDF | ![]() مشاهده فایل |
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Batten, Lynn. ; | en_US |
| dc.contributor.author | Kim, Dong Seong. ; | en_US |
| dc.contributor.author | Zhang, Xuyun. ; | en_US |
| dc.contributor.author | Li, Gang. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:27:55Z | - |
| dc.date.available | 2020-05-17T08:27:55Z | - |
| dc.date.issued | 2017 | en_US |
| dc.identifier.isbn | 9789811054211 ; | en_US |
| dc.identifier.isbn | 9789811054204 (print) ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/1350 | - |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | QA76.9.A25 ; | en_US |
| dc.description | Printed edition: ; 9789811054204. ; | en_US |
| dc.description | 005.8 ; 23 ; | en_US |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description.abstract | This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security. ; | en_US |
| dc.description.statementofresponsibility | edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li. | en_US |
| dc.description.tableofcontents | Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. ; | en_US |
| dc.format.extent | XIV, 223 p. 68 illus. ; online resource. ; | en_US |
| dc.publisher | Springer Singapore : | en_US |
| dc.publisher | Imprint: Springer, | en_US |
| dc.relation.ispartofseries | Communications in Computer and Information Science, ; 1865-0929 ; ; 719. ; | en_US |
| dc.relation.ispartofseries | Communications in Computer and Information Science, ; 1865-0929 ; ; 719. ; | en_US |
| dc.relation.haspart | 9789811054211.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Data encryption (Computer science). ; | en_US |
| dc.subject | Algorithms | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.subject | Data Encryption. ; | en_US |
| dc.subject | Algorithm Analysis and Problem Complexity. ; | en_US |
| dc.title | Applications and Techniques in Information Security | en_US |
| dc.title.alternative | 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6ee7, 2017, Proceedings / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Singapore : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9789811054211.pdf | 12 MB | Adobe PDF | ![]() مشاهده فایل |
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Batten, Lynn. ; | en_US |
| dc.contributor.author | Kim, Dong Seong. ; | en_US |
| dc.contributor.author | Zhang, Xuyun. ; | en_US |
| dc.contributor.author | Li, Gang. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:27:55Z | - |
| dc.date.available | 2020-05-17T08:27:55Z | - |
| dc.date.issued | 2017 | en_US |
| dc.identifier.isbn | 9789811054211 ; | en_US |
| dc.identifier.isbn | 9789811054204 (print) ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/1350 | - |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | QA76.9.A25 ; | en_US |
| dc.description | Printed edition: ; 9789811054204. ; | en_US |
| dc.description | 005.8 ; 23 ; | en_US |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description.abstract | This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security. ; | en_US |
| dc.description.statementofresponsibility | edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li. | en_US |
| dc.description.tableofcontents | Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. ; | en_US |
| dc.format.extent | XIV, 223 p. 68 illus. ; online resource. ; | en_US |
| dc.publisher | Springer Singapore : | en_US |
| dc.publisher | Imprint: Springer, | en_US |
| dc.relation.ispartofseries | Communications in Computer and Information Science, ; 1865-0929 ; ; 719. ; | en_US |
| dc.relation.ispartofseries | Communications in Computer and Information Science, ; 1865-0929 ; ; 719. ; | en_US |
| dc.relation.haspart | 9789811054211.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Data encryption (Computer science). ; | en_US |
| dc.subject | Algorithms | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.subject | Data Encryption. ; | en_US |
| dc.subject | Algorithm Analysis and Problem Complexity. ; | en_US |
| dc.title | Applications and Techniques in Information Security | en_US |
| dc.title.alternative | 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6ee7, 2017, Proceedings / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Singapore : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9789811054211.pdf | 12 MB | Adobe PDF | ![]() مشاهده فایل |
