|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-27189-2 |
003 |
DE-He213 |
005 |
20220117050454.0 |
007 |
cr nn 008mamaa |
008 |
111201s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642271892
|9 978-3-642-27189-2
|
024 |
7 |
|
|a 10.1007/978-3-642-27189-2
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Security Technology
|h [electronic resource] :
|b International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings /
|c edited by Tai-hoon Kim, Hojjat Adeli, Wai-chi Fang, Javier Garcia Villalba, Kirk P. Arnett, Muhammad Khurram Khan.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a 252 p. 83 illus., 53 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 259
|
520 |
|
|
|a This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Kim, Tai-hoon.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Adeli, Hojjat.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Fang, Wai-chi.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Villalba, Javier Garcia.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Arnett, Kirk P.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Khurram Khan, Muhammad.
|e editor.
|0 (orcid)0000-0001-6636-0533
|1 https://orcid.org/0000-0001-6636-0533
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642271885
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642271908
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 259
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-27189-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|