Security informatics:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Dordrecht [u.a.]
Springer
2010
|
Schriftenreihe: | Annals of information systems
9 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | VII, 170 S. Ill., graph. Darst. |
ISBN: | 9781441913241 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV025599806 | ||
003 | DE-604 | ||
005 | 20121204 | ||
007 | t | ||
008 | 100417s2010 ad|| |||| 00||| eng d | ||
020 | |a 9781441913241 |9 978-1-4419-1324-1 | ||
035 | |a (OCoLC)815876609 | ||
035 | |a (DE-599)BVBBV025599806 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-863 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Security informatics |c Christopher C. Yang ... eds. |
264 | 1 | |a Dordrecht [u.a.] |b Springer |c 2010 | |
300 | |a VII, 170 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Annals of information systems |v 9 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kriminalpolitik |0 (DE-588)4033181-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Kriminalpolitik |0 (DE-588)4033181-7 |D s |
689 | 0 | 1 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yang, Christopher C. |4 edt | |
830 | 0 | |a Annals of information systems |v 9 |w (DE-604)BV022718881 |9 9 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020195361&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020195361 |
Datensatz im Suchindex
DE-BY-863_location | 1340 |
---|---|
DE-BY-FWS_call_number | 1340/ST 277 Y22st |
DE-BY-FWS_katkey | 449724 |
DE-BY-FWS_media_number | 083101273137 |
_version_ | 1806173895644938240 |
adam_text | IMAGE 1
CONTENTS
FRAMING SOCIAL MOVEMENT IDENTITY WITH CYBER-ARTIFACTS: A CASE STUDY OF
THE INTERNATIONAL FALUN GONG MOVEMENT . . . . . . . . 1
YI-DA CHEN, AHMED ABBASI, AND HSINCHUN CHEN
PATTERNS OF WORD USE FOR DECEPTION IN TESTIMONY . . . . . . . . . . . .
. 25
DAVID B. SKILLICORN AND AYRON LITTLE
INFORMATION INTEGRATION FOR TERRORIST OR CRIMINAL SOCIAL NETWORKS . . .
41 CHRISTOPHER C. YANG AND XUNING TANG
PROCESSING CONSTRAINED K -CLOSEST PAIRS QUERIES IN CRIME DATABASES . .
59 SHAOJIE QIAO, CHANGJIE TANG, HUIDONG JIN, SHUCHENG DAI, XINGSHU CHEN,
MICHAEL CHAU, AND JIAN HU
EMERGENCY RESPONSE THROUGH HIGHER ORDER VORONOI DIAGRAMS . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 77
ICKJAI LEE, REECE PERSHOUSE, PETER PHILLIPS, KYUNGMI LEE, AND
CHRISTOPHER TORPELUND-BRUIN
IDENTITY MANAGEMENT ARCHITECTURE . . . . . . . . . . . . . . . . . . . .
. 97
UWE GLAESSER AND MONA VAJIHOLLAHI
A GAME THEORETIC FRAMEWORK FOR MULTI-AGENT DEPLOYMENT IN INTRUSION
DETECTION SYSTEMS . . . . . . . . . . . . . . . . . . . . . . . 117
YI-MING CHEN, DACHRAHN WU, AND CHENG-KUANG WU
ETKNET: A DISTRIBUTED NETWORK SYSTEM FOR SHARING EVENT DATA AND
MULTI-FACETED KNOWLEDGE IN A COLLABORATION FEDERATION . . . . . . 135
STANLEY Y.W. SU, HOWARD W. BECK, XUELIAN XIAO, JEFF DEPREE, SEEMA
DEGWEKAR, CHEN ZHOU, MINSOO LEE, CARLA THOMAS, ANDREW COGGESHALL, AND
RICHARD BOSTOCK
DUPLICATE WORK REDUCTION IN BUSINESS CONTINUITY AND RISK MANAGEMENT
PROCESSES . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
SHI-CHO CHA, PEI-WEN JUO, LI-TING LIU, AND WEI-NING CHEN
VII
|
any_adam_object | 1 |
author2 | Yang, Christopher C. |
author2_role | edt |
author2_variant | c c y cc ccy |
author_facet | Yang, Christopher C. |
building | Verbundindex |
bvnumber | BV025599806 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)815876609 (DE-599)BVBBV025599806 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01736nam a2200433 cb4500</leader><controlfield tag="001">BV025599806</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121204 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100417s2010 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441913241</subfield><subfield code="9">978-1-4419-1324-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815876609</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV025599806</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-863</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security informatics</subfield><subfield code="c">Christopher C. Yang ... eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dordrecht [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VII, 170 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Annals of information systems</subfield><subfield code="v">9</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kriminalpolitik</subfield><subfield code="0">(DE-588)4033181-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kriminalpolitik</subfield><subfield code="0">(DE-588)4033181-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Christopher C.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Annals of information systems</subfield><subfield code="v">9</subfield><subfield code="w">(DE-604)BV022718881</subfield><subfield code="9">9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020195361&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020195361</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV025599806 |
illustrated | Illustrated |
indexdate | 2024-08-01T10:40:54Z |
institution | BVB |
isbn | 9781441913241 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020195361 |
oclc_num | 815876609 |
open_access_boolean | |
owner | DE-11 DE-863 DE-BY-FWS |
owner_facet | DE-11 DE-863 DE-BY-FWS |
physical | VII, 170 S. Ill., graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Annals of information systems |
series2 | Annals of information systems |
spellingShingle | Security informatics Annals of information systems Innere Sicherheit (DE-588)4127888-4 gnd Data Mining (DE-588)4428654-5 gnd Computersicherheit (DE-588)4274324-2 gnd Kriminalpolitik (DE-588)4033181-7 gnd |
subject_GND | (DE-588)4127888-4 (DE-588)4428654-5 (DE-588)4274324-2 (DE-588)4033181-7 (DE-588)4143413-4 |
title | Security informatics |
title_auth | Security informatics |
title_exact_search | Security informatics |
title_full | Security informatics Christopher C. Yang ... eds. |
title_fullStr | Security informatics Christopher C. Yang ... eds. |
title_full_unstemmed | Security informatics Christopher C. Yang ... eds. |
title_short | Security informatics |
title_sort | security informatics |
topic | Innere Sicherheit (DE-588)4127888-4 gnd Data Mining (DE-588)4428654-5 gnd Computersicherheit (DE-588)4274324-2 gnd Kriminalpolitik (DE-588)4033181-7 gnd |
topic_facet | Innere Sicherheit Data Mining Computersicherheit Kriminalpolitik Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020195361&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022718881 |
work_keys_str_mv | AT yangchristopherc securityinformatics |
Inhaltsverzeichnis
THWS Würzburg Teilbibliothek SHL, Raum I.2.11
Signatur: |
1340 ST 277 Y22st |
---|---|
Exemplar 1 | nicht ausleihbar Verfügbar Bestellen |