Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security / / Martin Mohr.

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Karlsruhe : : KIT Scientific Publishing,, 2023.
Year of Publication:2023
Language:English
Physical Description:1 online resource (441 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993610569304498
ctrlnum (CKB)5580000000553602
(NjHacI)995580000000553602
(EXLCZ)995580000000553602
collection bib_alma
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00955nam a2200277 i 4500</leader><controlfield tag="001">993610569304498</controlfield><controlfield tag="005">20230815092528.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230815s2023 gw o 000 0 eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.5445/KSP/1000155035</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5580000000553602</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995580000000553602</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995580000000553602</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.S64</subfield><subfield code="b">.M647 2023</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.16</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mohr, Martin,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security /</subfield><subfield code="c">Martin Mohr.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Karlsruhe :</subfield><subfield code="b">KIT Scientific Publishing,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (441 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software support.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1000155035</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-08-18 03:31:07 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-07-01 21:33:43 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5346850120004498&amp;Force_direct=true</subfield><subfield code="Z">5346850120004498</subfield><subfield code="b">Available</subfield><subfield code="8">5346850120004498</subfield></datafield></record></collection>
record_format marc
spelling Mohr, Martin, author.
Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security / Martin Mohr.
Karlsruhe : KIT Scientific Publishing, 2023.
1 online resource (441 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on publisher supplied metadata and other sources.
Software support.
1000155035
language English
format eBook
author Mohr, Martin,
spellingShingle Mohr, Martin,
Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security /
author_facet Mohr, Martin,
author_variant m m mm
author_role VerfasserIn
author_sort Mohr, Martin,
title Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security /
title_full Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security / Martin Mohr.
title_fullStr Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security / Martin Mohr.
title_full_unstemmed Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security / Martin Mohr.
title_auth Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security /
title_new Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security /
title_sort systematic approaches to advanced information flow analysis - and applications to software security /
publisher KIT Scientific Publishing,
publishDate 2023
physical 1 online resource (441 pages)
isbn 1000155035
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.76 S64 M647 42023
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.16
dewey-sort 15.16
dewey-raw 005.16
dewey-search 005.16
work_keys_str_mv AT mohrmartin systematicapproachestoadvancedinformationflowanalysisandapplicationstosoftwaresecurity
status_str n
ids_txt_mv (CKB)5580000000553602
(NjHacI)995580000000553602
(EXLCZ)995580000000553602
carrierType_str_mv cr
is_hierarchy_title Systematic Approaches to Advanced Information Flow Analysis - and Applications to Software Security /
_version_ 1787553640709357568