Normal view MARC view ISBD view

Recent Advances in Intrusion Detection [electronic resource] :14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings / edited by Robin Sommer, Davide Balzarotti, Gregor Maier.

by Sommer, Robin [editor.]; Balzarotti, Davide [editor.]; Maier, Gregor [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 6961Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.Description: 398p. online resource.ISBN: 9783642236440.Subject(s): Computer science | Computer Communication Networks | Data structures (Computer science) | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Computers and Society | Algorithm Analysis and Problem Complexity | Data Structures, Cryptology and Information TheoryDDC classification: 004.6 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
TK5105.5-5105.9 (Browse shelf) Available

This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha