Emerging trends in ICT security:
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Massachusetts
Morgan Kaufmann/Elsevier
[2013]
|
Schriftenreihe: | Emerging trends in computer science & applied computing
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxix, 631 pages) illustrations |
ISBN: | 9780124104877 0124104878 1306119960 9781306119962 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126267 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124104877 |9 978-0-12-410487-7 | ||
020 | |a 0124104878 |9 0-12-410487-8 | ||
020 | |a 1306119960 |9 1-306-11996-0 | ||
020 | |a 9781306119962 |9 978-1-306-11996-2 | ||
035 | |a (ZDB-33-ESD)ocn863453607 | ||
035 | |a (OCoLC)863453607 | ||
035 | |a (DE-599)BVBBV046126267 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Emerging trends in ICT security |c edited by Babak Akhgar, Hamid R. Arabnia |
264 | 1 | |a Waltham, Massachusetts |b Morgan Kaufmann/Elsevier |c [2013] | |
300 | |a 1 online resource (xxix, 631 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Emerging trends in computer science & applied computing | |
500 | |a Includes bibliographical references and index | ||
520 | |a Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a Electronic surveillance |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Electronic surveillance | |
700 | 1 | |a Akhgar, Babak |4 edt | |
700 | 1 | |a Arabnia, Hamid |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0124114741 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124114746 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124114746 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506720 | ||
347 | |a data file |2 rda | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124114746 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180446196531200 |
---|---|
any_adam_object | |
author2 | Akhgar, Babak Arabnia, Hamid |
author2_role | edt edt |
author2_variant | b a ba h a ha |
author_facet | Akhgar, Babak Arabnia, Hamid |
building | Verbundindex |
bvnumber | BV046126267 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn863453607 (OCoLC)863453607 (DE-599)BVBBV046126267 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03144nmm a2200553zc 4500</leader><controlfield tag="001">BV046126267</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124104877</subfield><subfield code="9">978-0-12-410487-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124104878</subfield><subfield code="9">0-12-410487-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306119960</subfield><subfield code="9">1-306-11996-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306119962</subfield><subfield code="9">978-1-306-11996-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn863453607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)863453607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126267</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Emerging trends in ICT security</subfield><subfield code="c">edited by Babak Akhgar, Hamid R. Arabnia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Morgan Kaufmann/Elsevier</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxix, 631 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Emerging trends in computer science & applied computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic surveillance</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic surveillance</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Akhgar, Babak</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arabnia, Hamid</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0124114741</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124114746</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124114746</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506720</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124114746</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126267 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:53Z |
institution | BVB |
isbn | 9780124104877 0124104878 1306119960 9781306119962 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506720 |
oclc_num | 863453607 |
open_access_boolean | |
physical | 1 online resource (xxix, 631 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Morgan Kaufmann/Elsevier |
record_format | marc |
series2 | Emerging trends in computer science & applied computing |
spelling | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia Waltham, Massachusetts Morgan Kaufmann/Elsevier [2013] 1 online resource (xxix, 631 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Emerging trends in computer science & applied computing Includes bibliographical references and index Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Cyberterrorism / Prevention fast Electronic surveillance fast Information technology / Security measures fast Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention Electronic surveillance Akhgar, Babak edt Arabnia, Hamid edt Erscheint auch als Druck-Ausgabe 0124114741 Erscheint auch als Druck-Ausgabe 9780124114746 http://www.sciencedirect.com/science/book/9780124114746 Verlag URL des Erstveröffentlichers Volltext data file rda |
spellingShingle | Emerging trends in ICT security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Cyberterrorism / Prevention fast Electronic surveillance fast Information technology / Security measures fast Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention Electronic surveillance |
title | Emerging trends in ICT security |
title_auth | Emerging trends in ICT security |
title_exact_search | Emerging trends in ICT security |
title_full | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia |
title_fullStr | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia |
title_full_unstemmed | Emerging trends in ICT security edited by Babak Akhgar, Hamid R. Arabnia |
title_short | Emerging trends in ICT security |
title_sort | emerging trends in ict security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Cyberterrorism / Prevention fast Electronic surveillance fast Information technology / Security measures fast Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention Electronic surveillance |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer crimes / Prevention Cyberterrorism / Prevention Electronic surveillance Information technology / Security measures Information technology Security measures Computer crimes Prevention Cyberterrorism Prevention |
url | http://www.sciencedirect.com/science/book/9780124114746 |
work_keys_str_mv | AT akhgarbabak emergingtrendsinictsecurity AT arabniahamid emergingtrendsinictsecurity |