|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-04062-7 |
003 |
DE-He213 |
005 |
20220113001144.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642040627
|9 978-3-642-04062-7
|
024 |
7 |
|
|a 10.1007/978-3-642-04062-7
|2 doi
|
050 |
|
4 |
|a QA76.6-76.66
|
072 |
|
7 |
|a UM
|2 bicssc
|
072 |
|
7 |
|a COM051000
|2 bisacsh
|
072 |
|
7 |
|a UM
|2 thema
|
082 |
0 |
4 |
|a 005.11
|2 23
|
245 |
1 |
0 |
|a Global Security, Safety, and Sustainability
|h [electronic resource] :
|b 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings /
|c edited by Hamid Jahankhani, Ali G. Hessami, Feng Hsu.
|
250 |
|
|
|a 1st ed. 2009.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a X, 241 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 45
|
505 |
0 |
|
|a Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush! -- A Security Audit Framework for Security Management in the Enterprise -- Watermarking Spatial Data in Geographic Information Systems -- Situation Awareness in Systems of Systems Ad-Hoc Environments -- The Georgia's Cyberwar -- The UK Government's Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture -- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions -- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer's Trust -- A Systems Framework for Sustainability -- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path -- Geofencing in a Security Strategy Model -- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions -- The Significance of Security in Transmitting Clinical Data -- Security Concern over Earth Viewer Software Using Satellite Photo Service -- The People's Republic of China - The Emerging Cyberpower -- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation -- Neural Networks for Intrusion Detection Systems -- Exploitation of Secrets Injected in Java Midlets -- Biometrically Based Electronic Signatures for a Public Networked Environment -- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain -- The Kido Botnet: Back to the Future -- Information Systems Security and Its Affiliation to Information Technology Risk Management -- A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea -- Hey - Get Off My Cloud! -- Static and Dynamic Analysis for Web Security in Generic Format.
|
520 |
|
|
|a The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Pattern recognition systems.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Automated Pattern Recognition.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
700 |
1 |
|
|a Jahankhani, Hamid.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Hessami, Ali G.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Hsu, Feng.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642041051
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642040610
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 45
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-04062-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|