Emerging trends in ICT security:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Waltham, Massachusetts
Morgan Kaufmann/Elsevier
[2013]
|
Schlagworte: | |
Online-Zugang: | FAW01 FLA01 UBM01 Volltext |
Beschreibung: | Includes bibliographical references and index Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9780124104877 0124104878 9780124114746 0124114741 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314364 | ||
003 | DE-604 | ||
005 | 20180926 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124104877 |c electronic bk. |9 978-0-12-410487-7 | ||
020 | |a 0124104878 |c electronic bk. |9 0-12-410487-8 | ||
020 | |a 9780124114746 |9 978-0-12-411474-6 | ||
020 | |a 0124114741 |9 0-12-411474-1 | ||
035 | |a (ZDB-4-EBA)ocn863453607 | ||
035 | |a (ZDB-4-ITC)ocn863453607 | ||
035 | |a (OCoLC)863453607 | ||
035 | |a (DE-599)BVBBV042314364 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-19 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Emerging trends in ICT security |c edited by Babak Akhgar, Hamid R. Arabnia |
264 | 1 | |a Waltham, Massachusetts |b Morgan Kaufmann/Elsevier |c [2013] | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a Electronic surveillance |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Electronic surveillance | |
700 | 1 | |a Akhgar, Babak |e Sonstige |4 oth | |
700 | 1 | |a Arabnia, Hamid |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124114746 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-4-EBA |a ZDB-33-EBS |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027751355 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124114746 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124114746 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124114746 |l UBM01 |p ZDB-33-ESD |q UBM_PDA_ESD_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152907442946048 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042314364 |
collection | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn863453607 (ZDB-4-ITC)ocn863453607 (OCoLC)863453607 (DE-599)BVBBV042314364 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03308nmm a2200553zc 4500</leader><controlfield tag="001">BV042314364</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180926 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124104877</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-410487-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124104878</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-410487-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124114746</subfield><subfield code="9">978-0-12-411474-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124114741</subfield><subfield code="9">0-12-411474-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn863453607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn863453607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)863453607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314364</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Emerging trends in ICT security</subfield><subfield code="c">edited by Babak Akhgar, Hamid R. Arabnia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Morgan Kaufmann/Elsevier</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic surveillance</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic surveillance</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Akhgar, Babak</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arabnia, Hamid</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124114746</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-33-EBS</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751355</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124114746</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124114746</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124114746</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">UBM_PDA_ESD_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042314364 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9780124104877 0124104878 9780124114746 0124114741 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751355 |
oclc_num | 863453607 |
open_access_boolean | |
owner | DE-1046 DE-19 DE-BY-UBM |
owner_facet | DE-1046 DE-19 DE-BY-UBM |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD UBM_PDA_ESD_Kauf |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Morgan Kaufmann/Elsevier |
record_format | marc |
spelling | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia Waltham, Massachusetts Morgan Kaufmann/Elsevier [2013] 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Cyberterrorism / Prevention fast Electronic surveillance fast Information technology / Security measures fast Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention Electronic surveillance Akhgar, Babak Sonstige oth Arabnia, Hamid Sonstige oth http://www.sciencedirect.com/science/book/9780124114746 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Emerging trends in ICT security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Cyberterrorism / Prevention fast Electronic surveillance fast Information technology / Security measures fast Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention Electronic surveillance |
title | Emerging trends in ICT security |
title_auth | Emerging trends in ICT security |
title_exact_search | Emerging trends in ICT security |
title_full | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia |
title_fullStr | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia |
title_full_unstemmed | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia |
title_short | Emerging trends in ICT security |
title_sort | emerging trends in ict security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Cyberterrorism / Prevention fast Electronic surveillance fast Information technology / Security measures fast Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention Electronic surveillance |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer crimes / Prevention Cyberterrorism / Prevention Electronic surveillance Information technology / Security measures Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention |
url | http://www.sciencedirect.com/science/book/9780124114746 |
work_keys_str_mv | AT akhgarbabak emergingtrendsinictsecurity AT arabniahamid emergingtrendsinictsecurity |