|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-94-007-2911-7 |
003 |
DE-He213 |
005 |
20220113182750.0 |
007 |
cr nn 008mamaa |
008 |
111206s2012 ne | s |||| 0|eng d |
020 |
|
|
|a 9789400729117
|9 978-94-007-2911-7
|
024 |
7 |
|
|a 10.1007/978-94-007-2911-7
|2 doi
|
050 |
|
4 |
|a TK5101-5105.9
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
245 |
1 |
0 |
|a Proceedings of the International Conference on IT Convergence and Security 2011
|h [electronic resource] /
|c edited by Kuinam J. Kim, Seong Jin Ahn.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Dordrecht :
|b Springer Netherlands :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIV, 642 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1119 ;
|v 120
|
505 |
0 |
|
|a Part 1 Security Fundamentals -- Part 2 Industrial & Business Information Security -- Part 3 Security Protocols and Applications -- Part 4 Convergence Security -- Part 5 IT Convergence Applications -- Part 6 Mobile Computing and Future Networks -- Part 7 Multimedia and Information Visualization -- Part 8 Web Technology and Software Engineering.
|
520 |
|
|
|a As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1. Introduction of the most recent information technology and its related ideas 2. Applications and problems related to technology convergence, and its case studies 3. Introduction of converging existing security techniques through convergence security Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Artificial Intelligence.
|
700 |
1 |
|
|a Kim, Kuinam J.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ahn, Seong Jin.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789400798632
|
776 |
0 |
8 |
|i Printed edition:
|z 9789400729100
|
776 |
0 |
8 |
|i Printed edition:
|z 9789400729124
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1119 ;
|v 120
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-94-007-2911-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|