|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-15717-2 |
003 |
DE-He213 |
005 |
20220117055822.0 |
007 |
cr nn 008mamaa |
008 |
100901s2010 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642157172
|9 978-3-642-15717-2
|
024 |
7 |
|
|a 10.1007/978-3-642-15717-2
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Global Security, Safety, and Sustainability
|h [electronic resource] :
|b 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings /
|c edited by Sergio Tenreiro de Magalhaes, Hamid Jahankhani, Ali G. Hessami.
|
250 |
|
|
|a 1st ed. 2010.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2010.
|
300 |
|
|
|a XI, 301 p. 84 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 92
|
505 |
0 |
|
|a Management of the Benefits on the Client's Involvement on Ergonomic Analysis -- A Security Audit Framework to Manage Information System Security -- The Cloud's Core Virtual Infrastructure Security -- Collaboration and Command Tools for Crises Management -- Trust and Reputation Management for Critical Infrastructure Protection -- An Approach to Textual Steganography -- Cybercrime Victimisations/Criminalisation and Punishment -- Baby-Crying Acceptance -- Design of Discrete Variable Structure Controller Based on Variable Boundary Layer -- Cognitive Biometrics: Challenges for the Future -- Multimodal Biometrics and Multilayered IDM for Secure Authentication -- Secure Biometric Multi-Logon System Based on Current Authentication Technologies -- Analysis of Fingerprint Image to Verify a Person -- Methods of Organizational Information Security -- OTM Machine Acceptance: In the Arab Culture -- A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust -- Does Nationality Matter in the B2C Environment? Results from a Two Nation Study -- Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company) -- Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks -- The Effect of Non-technical Factors in B2C E-Commerce -- Self-monitoring Composite Rods for Sustainable Construction -- Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach -- A Review on Sustainability Models -- The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling -- "Fiscal Illusion Causes Fiscal Delusion - Please Be Careful!" -- A Coloured Petri Net Analysis of the Transaction Internet Protocol -- Identification of the Required Security Practices during e-Government Maturity -- Dynamic Device Configuration in Ubiquitous Environments -- Mitigation of Control Channel Jamming via Combinatorial Key Distribution -- A Proxy Signature Scheme Based on Coding Theory -- Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes.
|
520 |
|
|
|a The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between acad- ics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The three-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. The importance of adopting systematic and systemic - proaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge on the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2010 received paper submissions from more than 17 different countries in all continents. Only 31 papers were selected and were presented as full papers. The program also included a number of keynote lectures by leading researchers, security professionals and government representatives.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Tenreiro de Magalhaes, Sergio.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jahankhani, Hamid.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Hessami, Ali G.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642157165
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642157189
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 92
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-15717-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|