Detection of Intrusions and Malware, and Vulnerability Assessment (Registro nro. 202581)

MARC details
000 -LÍDER
fixed length control field 04592nam a22005415i 4500
001 - NÚMERO DE CONTROL
control field u374701
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
control field SIRSI
005 - FECHA Y HORA DE LA ULTIMA TRANSACCIÓN
control field 20160812084247.0
007 - CAMPO FIJO DE DESCRIPCIÓN FIJA--INFORMACIÓN GENERAL
fixed length control field cr nn 008mamaa
008 - ELEMENTOS DE LONGITUD FIJA -- INFORMACIÓN GENERAL
fixed length control field 100702s2010 gw | s |||| 0|eng d
020 ## - NÚMERO INTERNACIONAL NORMALIZADO PARA LIBROS
International Standard Book Number 9783642142154
-- 978-3-642-14215-4
040 ## - FUENTE DE CATALOGACIÓN
Transcribing agency MX-MeUAM
050 #4 - SIGNATURA TOPOGRÁFICA DE LA BIBLIOTECA DEL CONGRESO
Classification number TK5105.5-5105.9
082 04 - NÚMERO DE CLASIFICACIÓN DECIMAL DEWEY
Classification number 004.6
Edition number 23
100 1# - ASIENTO PRINCIPAL--NOMBRE PERSONAL
Personal name Kreibich, Christian.
Relator term editor.
245 10 - MENCIÓN DE TITULO
Title Detection of Intrusions and Malware, and Vulnerability Assessment
Medium [recurso electrónico] :
Remainder of title 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings /
Statement of responsibility, etc. edited by Christian Kreibich, Marko Jahnke.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg,
Date of production, publication, distribution, manufacture, or copyright notice 2010.
300 ## - DESCRIPCIÓN FÍSICA
Extent XII, 219p. 55 illus.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - MENCIÓN DE SERIE
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume/sequential designation 6201
505 0# - NOTA DE CONTENIDO
Formatted contents note Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS – Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.
520 ## - NOTA DE RESUMEN, ETC.
Summary, etc. On behalf of the Programand Steering Committees it is our pleasure to present to you the proceedings of the 7th GI International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), documenting the work presented at the conference this year. As in the past, the conference broughttogetherinternationalexpertsfromacademia,industry,andgovernment to present and discuss novel security research. Thisyearthe27membersoftheProgramCommitteereceived34submissions from 18 countries. The committee, selected to represent a balanced mixture of both mature and young excellence in the ?eld, honesty, and good judgement, carefully reviewed and evaluated all submissions at least threefold, according to scienti?c novelty, relevance, and technical quality. The ?nal selection took place on March 29, 2010 at the Technische Universitat ¨ Munc ¨ hen, Germany. In the end, we accepted 12 papers for publication and presentation at the conference, including two extended abstracts. DIMVA 2010took placeatthe Centre ofSciences in Bonn,Germany,onJuly 8 and 9. The program featured work from a wide range of topics in security, grouped into ?ve sessions that are re?ected in the chapters of the proceedings you are now reading. In addition, the conference featured three invited talks which greatly contributed to the event. We are very grateful to Jos´ e Nazario (Arbor Networks), Carel van Straaten (Spamhaus), and Marc Dacier (Sym- tec/Eurecom) for their insightful and entertaining presentations. Thanks also to Sven Dietrich (Stevens Institute of Technology) for once again organizing and hosting the rump session, which contained a diverse range of forthcoming work.
596 ## -
-- 19
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer science.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Communication Networks.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer software.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Information systems.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Information Systems.
650 14 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Science.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Management of Computing and Information Systems.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data Encryption.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computers and Society.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Information Systems Applications (incl.Internet).
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
700 1# - ASIENTO SECUNDARIO - NOMBRE PERSONAL
Personal name Jahnke, Marko.
Relator term editor.
710 2# - ASIENTO SECUNDARIO - NOMBRE CORPORATIVO
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783642142147
830 #0 - ASIENTO SECUNDARIO DE SERIE--TITULO UNIFORME
Uniform title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 6201
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS
Public note Libro electrónico
Uniform Resource Identifier <a href="http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14215-4">http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14215-4</a>
942 ## - TIPO DE MATERIAL (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Fuente de clasificación Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Signatura topográfica Código de barras Date last seen Número de copia Tipo de material
    Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica     TK5105.5 -5105.9 374701-2001 12/08/2016 1 Libro Electrónico

Con tecnología Koha