Network Security Algorithms

Zitieren

Dateien zu dieser Ressource

Prüfsumme: MD5:009b76980ebb591a5999e5358c483d71

ZINK, Thomas, 2007. Network Security Algorithms

@misc{Zink2007Netwo-17598, title={Network Security Algorithms}, year={2007}, author={Zink, Thomas} }

<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/rdf/resource/123456789/17598"> <dc:language>eng</dc:language> <dcterms:rights rdf:resource="http://nbn-resolving.org/urn:nbn:de:bsz:352-20140905103605204-4002607-1"/> <dc:contributor>Zink, Thomas</dc:contributor> <dcterms:issued>2007</dcterms:issued> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/17598"/> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-02-29T10:28:51Z</dcterms:available> <dcterms:abstract xml:lang="eng">Viruses, Worms and Trojan Horses, the malware zoo is grow- ing every day. Hackers and Crackers try to penetrate computer systems, either for fun or for commercial benefit. Zombie-like creatures called Bots attack in the 10’s of thousands. Computer intrusions cause monetary as well as prestige losses. Countermeasures surely have to be taken, so a look on current technology and future outlines seems advisable.</dcterms:abstract> <dc:creator>Zink, Thomas</dc:creator> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-02-29T10:28:51Z</dc:date> <dc:rights>deposit-license</dc:rights> <dcterms:title>Network Security Algorithms</dcterms:title> </rdf:Description> </rdf:RDF>

Dateiabrufe seit 01.10.2014 (Informationen über die Zugriffsstatistik)

network_security_algorithms.pdf 344

Das Dokument erscheint in:

KOPS Suche


Stöbern

Mein Benutzerkonto