From Database to Cyber Security (Record no. 86915)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05191nam a22006495i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-04834-1 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730170420.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 181129s2018 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783030048341 |
-- | 978-3-030-04834-1 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-030-04834-1 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | From Database to Cyber Security |
Medium | [electronic resource] : |
Remainder of title | Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / |
Statement of responsibility, etc. | edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2018. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cham : |
Name of producer, publisher, distributor, manufacturer | Springer International Publishing : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2018. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 487 p. 147 illus., 98 illus. in color. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 11170 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on PartitionedData -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. . |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This Festschrift is in honor of Sushil Jajodia, Professor in the George Mason University, USA, on the occasion of his 70th birthday. This book contains papers written in honor of Sushil Jajodia, of his vision and his achievements. Sushil has sustained a highly active research agenda spanning several important areas in computer security and privacy, and established himself as a leader in the security research community through unique scholarship and service. He has extraordinarily impacted the scientific and academic community, opening and pioneering new directions of research, and significantly influencing the research and development of security solutions worldwide. Also, his excellent record of research funding shows his commitment to sponsored research and the practical impact of his work. The research areas presented in this Festschrift include membrane computing, spiking neural networks, phylogenetic networks, ant colonies optimization, work bench for bio-computing, reactionsystems, entropy of computation, rewriting systems, and insertion-deletion systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 7245 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and civilization. |
9 (RLIN) | 21733 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Application software. |
9 (RLIN) | 93350 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data and Information Security. |
9 (RLIN) | 31990 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 93352 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and Society. |
9 (RLIN) | 31668 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer and Information Systems Applications. |
9 (RLIN) | 93354 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Samarati, Pierangela. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 93355 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ray, Indrajit. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 93357 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ray, Indrakshi. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 93358 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 93360 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783030048334 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783030048358 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 11170 |
9 (RLIN) | 93362 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.