|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-10975-6 |
003 |
DE-He213 |
005 |
20220113012824.0 |
007 |
cr nn 008mamaa |
008 |
140903s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319109756
|9 978-3-319-10975-6
|
024 |
7 |
|
|a 10.1007/978-3-319-10975-6
|2 doi
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UB
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a UX
|2 thema
|
082 |
0 |
4 |
|a 005.3
|2 23
|
245 |
1 |
0 |
|a Availability, Reliability, and Security in Information Systems
|h [electronic resource] :
|b IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings /
|c edited by Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XII, 311 p. 111 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 8708
|
505 |
0 |
|
|a Knowledge Management -- Software Security -- Mobile and Social Computing -- Security and Cognitive Informatics -- Homeland Defense.
|
520 |
|
|
|a This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Biometric identification.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Teufel, Stephanie.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a A Min, Tjoa.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a You, Illsun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Weippl, Edgar.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319109763
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319109749
|
830 |
|
0 |
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 8708
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-10975-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|