It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:311024997:1548
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:311024997:1548?format=raw

LEADER: 01548nam a22003855a 4500
001 013276003-7
005 20120706200152.0
008 120321s2012 gw | s ||0| 0|eng d
020 $a9783642286414$99783642286414 (ebk.)
020 $a9783642286414
024 7 $a10.1007/978-3-642-28641-4$2doi
035 $a(Springer)9783642286414
040 $aSpringer
100 1 $aDegano, Pierpaolo.
245 10 $aPrinciples of Security and Trust :$bFirst International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings /$cedited by Pierpaolo Degano, Joshua D. Guttman.
260 $aBerlin, Heidelberg :$bSpringer Berlin Heidelberg,$c2012.
490 0 $aLecture Notes in Computer Science,$x0302-9743 ;$v7215
650 10 $aComputer science.
650 0 $aData encryption (Computer science)
650 0 $aComputer science.
650 0 $aComputer Communication Networks.
650 0 $aData protection.
650 0 $aComputer software.
650 0 $aInformation Systems.
650 24 $aComputer Communication Networks.
650 24 $aData Encryption.
650 24 $aSystems and Data Security.
650 24 $aComputers and Society.
650 24 $aManagement of Computing and Information Systems.
650 24 $aAlgorithm Analysis and Problem Complexity.
700 1 $aGuttman, Joshua D.
776 08 $iPrinted edition:$z9783642286407
830 0 $aLecture notes in computer science ;$v7215.
988 $a20120629
906 $0VEN