Use of risk analysis in computer-aided persuasion:
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, D.C.
IOS Press
2011
|
Schriftenreihe: | NATO science for peace and security series
v. 88 |
Schlagworte: | |
Beschreibung: | "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes |
Beschreibung: | 1 online resource (viii, 337 pages) |
ISBN: | 9781607508281 1607508281 9781607508274 1607508273 1283432986 9781283432986 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045349495 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781607508281 |9 978-1-60750-828-1 | ||
020 | |a 1607508281 |9 1-60750-828-1 | ||
020 | |a 9781607508274 |9 978-1-60750-827-4 | ||
020 | |a 1607508273 |9 1-60750-827-3 | ||
020 | |a 1283432986 |9 1-283-43298-6 | ||
020 | |a 9781283432986 |9 978-1-283-43298-6 | ||
035 | |a (ZDB-4-ITC)ocn772636235 | ||
035 | |a (OCoLC)772636235 | ||
035 | |a (DE-599)BVBBV045349495 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
110 | 2 | |a NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Use of risk analysis in computer-aided persuasion |c edited by Ekrem Duman and Amir F. Atiya |
264 | 1 | |a Amsterdam ; Washington, D.C. |b IOS Press |c 2011 | |
300 | |a 1 online resource (viii, 337 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO science for peace and security series |v v. 88 | |
500 | |a "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes | ||
505 | 8 | |a Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Congresses |a National security |x Risk assessment |v Congresses |a Data protection |v Congresses | |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Duman, Ekrem |e Sonstige |4 oth | |
700 | 1 | |a Atiya, Amir F. |e Sonstige |4 oth | |
710 | 2 | |a IOS Press |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Use of risk analysis in computer-aided persuasion |d Amsterdam ; Washington, D.C. : IOS Press, 2011 |z 9781607508274 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736149 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179173430788096 |
---|---|
any_adam_object | |
author_corporate | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |
author_corporate_role | aut |
author_facet | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |
author_sort | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |
building | Verbundindex |
bvnumber | BV045349495 |
collection | ZDB-4-ITC |
contents | Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f |
ctrlnum | (ZDB-4-ITC)ocn772636235 (OCoLC)772636235 (DE-599)BVBBV045349495 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02982nmm a2200517zcb4500</leader><controlfield tag="001">BV045349495</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508281</subfield><subfield code="9">978-1-60750-828-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607508281</subfield><subfield code="9">1-60750-828-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508274</subfield><subfield code="9">978-1-60750-827-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607508273</subfield><subfield code="9">1-60750-827-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283432986</subfield><subfield code="9">1-283-43298-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283432986</subfield><subfield code="9">978-1-283-43298-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn772636235</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)772636235</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349495</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Use of risk analysis in computer-aided persuasion</subfield><subfield code="c">edited by Ekrem Duman and Amir F. Atiya</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam ; Washington, D.C.</subfield><subfield code="b">IOS Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (viii, 337 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO science for peace and security series</subfield><subfield code="v">v. 88</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield><subfield code="a">National security</subfield><subfield code="x">Risk assessment</subfield><subfield code="v">Congresses</subfield><subfield code="a">Data protection</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Duman, Ekrem</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Atiya, Amir F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Use of risk analysis in computer-aided persuasion</subfield><subfield code="d">Amsterdam ; Washington, D.C. : IOS Press, 2011</subfield><subfield code="z">9781607508274</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736149</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV045349495 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781607508281 1607508281 9781607508274 1607508273 1283432986 9781283432986 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736149 |
oclc_num | 772636235 |
open_access_boolean | |
physical | 1 online resource (viii, 337 pages) |
psigel | ZDB-4-ITC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press |
record_format | marc |
series2 | NATO science for peace and security series |
spelling | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> Verfasser aut Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya Amsterdam ; Washington, D.C. IOS Press 2011 1 online resource (viii, 337 pages) txt rdacontent c rdamedia cr rdacarrier NATO science for peace and security series v. 88 "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses 1\p (DE-588)1071861417 Konferenzschrift gnd-content Duman, Ekrem Sonstige oth Atiya, Amir F. Sonstige oth IOS Press Sonstige oth Erscheint auch als Druck-Ausgabe Use of risk analysis in computer-aided persuasion Amsterdam ; Washington, D.C. : IOS Press, 2011 9781607508274 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Use of risk analysis in computer-aided persuasion Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses |
subject_GND | (DE-588)1071861417 |
title | Use of risk analysis in computer-aided persuasion |
title_auth | Use of risk analysis in computer-aided persuasion |
title_exact_search | Use of risk analysis in computer-aided persuasion |
title_full | Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya |
title_fullStr | Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya |
title_full_unstemmed | Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya |
title_short | Use of risk analysis in computer-aided persuasion |
title_sort | use of risk analysis in computer aided persuasion |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Data protection Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses Konferenzschrift |
work_keys_str_mv | AT natoadvancedresearchworkshopontheuseofriskanalysistoprotectagainstintelligentthreats2011antalyaturkey useofriskanalysisincomputeraidedpersuasion AT dumanekrem useofriskanalysisincomputeraidedpersuasion AT atiyaamirf useofriskanalysisincomputeraidedpersuasion AT iospress useofriskanalysisincomputeraidedpersuasion |