|
|
|
|
LEADER |
03673nam a22005895i 4500 |
001 |
978-3-319-10975-6 |
003 |
DE-He213 |
005 |
20210624212702.0 |
007 |
cr nn 008mamaa |
008 |
140903s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319109756
|9 978-3-319-10975-6
|
024 |
7 |
|
|a 10.1007/978-3-319-10975-6
|2 doi
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UNH
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a UNH
|2 thema
|
072 |
|
7 |
|a UDBD
|2 thema
|
082 |
0 |
4 |
|a 005.7
|2 23
|
245 |
1 |
0 |
|a Availability, Reliability, and Security in Information Systems
|h [electronic resource] :
|b IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings /
|c edited by Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XII, 311 p. 111 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 8708
|
505 |
0 |
|
|a Knowledge Management -- Software Security -- Mobile and Social Computing -- Security and Cognitive Informatics -- Homeland Defense.
|
520 |
|
|
|a This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Information Systems Applications (incl. Internet).
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Biometrics.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I22040
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I16021
|
700 |
1 |
|
|a Teufel, Stephanie.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a A Min, Tjoa.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a You, Illsun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Weippl, Edgar.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319109763
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319109749
|
830 |
|
0 |
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 8708
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-10975-6
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|