IT convergence and security 2012:
<p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and th...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Dordrecht [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in electrical engineering
215 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FWS01 UBY01 Volltext Inhaltsverzeichnis Abstract |
Zusammenfassung: | <p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. </p><p>The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.</p> |
Beschreibung: | From the Contents: Security Fundamentals -- Industrial & Business Information Security -- Security Protocols and Applications -- Convergence Security -- IT Convergence Applications -- Mobile Computing and Future Networks -- Multimedia and Information Visualization -- Convergence Data Mining and Artificial Intelligence -- Web Technology and Software Engineering -- Green Convergence Services |
Beschreibung: | 1 Online-Ressource (XIX, 1242 p. 546 illus) |
ISBN: | 9789400758605 |
DOI: | 10.1007/978-94-007-5860-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV040982614 | ||
003 | DE-604 | ||
005 | 20160316 | ||
007 | cr|uuu---uuuuu | ||
008 | 130506s2013 |||| o||u| ||||||eng d | ||
020 | |a 9789400758605 |c Online |9 978-94-007-5860-5 | ||
024 | 7 | |a 10.1007/978-94-007-5860-5 |2 doi | |
035 | |a (OCoLC)827054239 | ||
035 | |a (DE-599)BVBBV040982614 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-898 |a DE-634 |a DE-573 |a DE-Aug4 |a DE-859 |a DE-706 |a DE-863 | ||
082 | 0 | |a 621.382 | |
110 | 2 | |a International Conference on IT Convergence and Security |e Verfasser |4 aut | |
245 | 1 | 0 | |a IT convergence and security 2012 |c Kuinam J. Kim ..., eds. |
264 | 1 | |a Dordrecht [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIX, 1242 p. 546 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in electrical engineering |v 215 | |
500 | |a From the Contents: Security Fundamentals -- Industrial & Business Information Security -- Security Protocols and Applications -- Convergence Security -- IT Convergence Applications -- Mobile Computing and Future Networks -- Multimedia and Information Visualization -- Convergence Data Mining and Artificial Intelligence -- Web Technology and Software Engineering -- Green Convergence Services | ||
520 | |a <p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. </p><p>The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.</p> | ||
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Engineering | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Telecommunication | |
700 | 1 | |a Kim, Kuinam J. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-94-007-5859-9 |
830 | 0 | |a Lecture notes in electrical engineering |v 215 |w (DE-604)BV042385829 |9 215 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-94-007-5860-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025960573 | ||
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 923057 |
---|---|
_version_ | 1806194905087737856 |
adam_text | IT CONVERGENCE AND SECURITY 2012
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FROM THE CONTENTS: SECURITY FUNDAMENTALS
INDUSTRIAL & BUSINESS INFORMATION SECURITY
SECURITY PROTOCOLS AND APPLICATIONS
CONVERGENCE SECURITY
IT CONVERGENCE APPLICATIONS
MOBILE COMPUTING AND FUTURE NETWORKS
MULTIMEDIA AND INFORMATION VISUALIZATION
CONVERGENCE DATA MINING AND ARTIFICIAL INTELLIGENCE
WEB TECHNOLOGY AND SOFTWARE ENGINEERING
GREEN CONVERGENCE SERVICES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
IT CONVERGENCE AND SECURITY 2012
/
: 2013
ABSTRACT / INHALTSTEXT
THE PROCEEDINGS APPROACHES THE SUBJECT MATTER WITH PROBLEMS IN TECHNICAL
CONVERGENCE AND CONVERGENCES OF SECURITY TECHNOLOGY. THIS APPROACH IS
NEW BECAUSE WE LOOK AT NEW ISSUES THAT ARISE FROM TECHNIQUES CONVERGING.
THE GENERAL SCOPE OF THE PROCEEDINGS CONTENT IS CONVERGENCE SECURITY AND
THE LATEST INFORMATION TECHNOLOGY. THE INTENDED READERSHIP ARE
SOCIETIES, ENTERPRISES, AND RESEARCH INSTITUTES, AND INTENDED CONTENT
LEVEL IS MID- TO HIGHLY EDUCATED PERSONALS. THE MOST IMPORTANT FEATURES
AND BENEFITS OF THE PROCEEDINGS ARE THE INTRODUCTION OF THE MOST RECENT
INFORMATION TECHNOLOGY AND ITS RELATED IDEAS, APPLICATIONS AND PROBLEMS
RELATED TO TECHNOLOGY CONVERGENCE, AND ITS CASE STUDIES AND FINALLY AN
INTRODUCTION OF CONVERGING EXISTING SECURITY TECHNIQUES THROUGH
CONVERGENCE SECURITY. OVERALL, THROUGH THE PROCEEDINGS, AUTHORS WILL BE
ABLE TO UNDERSTAND THE MOST STATE OF THE ART INFORMATION STRATEGIES AND
TECHNOLOGIES OF CONVERGENCE SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Kim, Kuinam J. |
author2_role | edt |
author2_variant | k j k kj kjk |
author_corporate | International Conference on IT Convergence and Security |
author_corporate_role | aut |
author_facet | Kim, Kuinam J. International Conference on IT Convergence and Security |
author_sort | International Conference on IT Convergence and Security |
building | Verbundindex |
bvnumber | BV040982614 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)827054239 (DE-599)BVBBV040982614 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-94-007-5860-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04082nmm a2200541zcb4500</leader><controlfield tag="001">BV040982614</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160316 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130506s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789400758605</subfield><subfield code="c">Online</subfield><subfield code="9">978-94-007-5860-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-94-007-5860-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)827054239</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040982614</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">International Conference on IT Convergence and Security</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IT convergence and security 2012</subfield><subfield code="c">Kuinam J. Kim ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dordrecht [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 1242 p. 546 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in electrical engineering</subfield><subfield code="v">215</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">From the Contents: Security Fundamentals -- Industrial &amp; Business Information Security -- Security Protocols and Applications -- Convergence Security -- IT Convergence Applications -- Mobile Computing and Future Networks -- Multimedia and Information Visualization -- Convergence Data Mining and Artificial Intelligence -- Web Technology and Software Engineering -- Green Convergence Services</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"><p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. </p><p>The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.</p></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Kuinam J.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-94-007-5859-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in electrical engineering</subfield><subfield code="v">215</subfield><subfield code="w">(DE-604)BV042385829</subfield><subfield code="9">215</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025960573</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040982614 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T16:14:51Z |
institution | BVB |
isbn | 9789400758605 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025960573 |
oclc_num | 827054239 |
open_access_boolean | |
owner | DE-92 DE-898 DE-BY-UBR DE-634 DE-573 DE-Aug4 DE-859 DE-706 DE-863 DE-BY-FWS |
owner_facet | DE-92 DE-898 DE-BY-UBR DE-634 DE-573 DE-Aug4 DE-859 DE-706 DE-863 DE-BY-FWS |
physical | 1 Online-Ressource (XIX, 1242 p. 546 illus) |
psigel | ZDB-2-ENG |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in electrical engineering |
series2 | Lecture notes in electrical engineering |
spellingShingle | IT convergence and security 2012 Lecture notes in electrical engineering Ingenieurwissenschaften Engineering Computer Communication Networks Telecommunication |
title | IT convergence and security 2012 |
title_auth | IT convergence and security 2012 |
title_exact_search | IT convergence and security 2012 |
title_full | IT convergence and security 2012 Kuinam J. Kim ..., eds. |
title_fullStr | IT convergence and security 2012 Kuinam J. Kim ..., eds. |
title_full_unstemmed | IT convergence and security 2012 Kuinam J. Kim ..., eds. |
title_short | IT convergence and security 2012 |
title_sort | it convergence and security 2012 |
topic | Ingenieurwissenschaften Engineering Computer Communication Networks Telecommunication |
topic_facet | Ingenieurwissenschaften Engineering Computer Communication Networks Telecommunication |
url | https://doi.org/10.1007/978-94-007-5860-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV042385829 |
work_keys_str_mv | AT internationalconferenceonitconvergenceandsecurity itconvergenceandsecurity2012 AT kimkuinamj itconvergenceandsecurity2012 |