Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Visualization for Computer Security5...
~
(1998 :)
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Visualization for Computer SecurityJohn R. Goodall, Gregory Conti, Kwan-Liu Ma (Eds.).
Reminder of title:
5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
other author:
Conti, Greg.
corporate name:
Published:
Berlin, Heidelberg :Springer-Verlag Berlin Heidelberg,2008.
Description:
xxi, 809 p. :ill., digital ;24 cm.
Series:
lecture notes in computer science,
Contained By:
Springer eBooks
Subject:
Computer security.
Online resource:
http://dx.doi.org/10.1007/978-3-540-85933-8
ISBN:
9783540859314 (paper)
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
Visualization for Computer Security
5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /[electronic resource] :John R. Goodall, Gregory Conti, Kwan-Liu Ma (Eds.). - Berlin, Heidelberg :Springer-Verlag Berlin Heidelberg,2008. - xxi, 809 p. :ill., digital ;24 cm. - lecture notes in computer science,52100302-9743 ;.
ISBN: 9783540859314 (paper)Subjects--Topical Terms:
184416
Computer security.
Dewey Class. No.: 005.8
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
LDR
:00946nam _22002295a_450
001
197924
003
Springer
005
20081031163042.0
006
m d
007
cr nn 008maaau
008
090528s2008 gw j eng d
020
$a
9783540859314 (paper)
020
$a
9783540859338 (electronic bk.)
035
$a
00354563
082
0 4
$2
22
$a
005.8
090
$a
QA76.9.A25
$b
V864 2008
111
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Visualization for Computer Security
$b
5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
$c
John R. Goodall, Gregory Conti, Kwan-Liu Ma (Eds.).
$h
[electronic resource] :
260
$a
Berlin, Heidelberg :
$c
2008.
$b
Springer-Verlag Berlin Heidelberg,
300
$a
xxi, 809 p. :
$b
ill., digital ;
$c
24 cm.
440
0
$a
lecture notes in computer science,
$v
5210
$x
0302-9743 ;
650
$a
Computer security.
$3
184416
650
$a
Computer Science.
$3
212513
650
$a
Computer Communication Networks.
$3
218087
650
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
274492
650
$a
Data Mining and Knowledge Discovery.
$3
275288
650
$a
Data Structures, Cryptology and Information Theory.
$3
273993
650
$a
Visualization.
$3
182994
650
$a
Computer networks
$x
Security measures.
$3
185597
650
$a
Information visualization.
$3
248886
700
$a
Conti, Greg.
$3
306013
700
$a
Ma, Kwan-Liu.
$3
306014
700
$a
Goodall, John R.
$3
306012
710
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-540-85933-8
$z
http://dx.doi.org/10.1007/978-3-540-85933-8
950
$a
Computer Science (Springer-11645; ZDB-2-SCS)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000022190
電子館藏
1圖書
電子書
EB QA76.9.A25 V864 2008
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-540-85933-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login