IT convergence and security 2012:
<p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and th...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Dordrecht [u.a.]
Springer
2013
|
Series: | Lecture notes in electrical engineering
215 |
Subjects: | |
Links: | https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 https://doi.org/10.1007/978-94-007-5860-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
Summary: | <p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. </p><p>The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.</p> |
Item Description: | From the Contents: Security Fundamentals -- Industrial & Business Information Security -- Security Protocols and Applications -- Convergence Security -- IT Convergence Applications -- Mobile Computing and Future Networks -- Multimedia and Information Visualization -- Convergence Data Mining and Artificial Intelligence -- Web Technology and Software Engineering -- Green Convergence Services |
Physical Description: | 1 Online-Ressource (XIX, 1242 p. 546 illus) |
ISBN: | 9789400758605 |
DOI: | 10.1007/978-94-007-5860-5 |
Staff View
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV040982614 | ||
003 | DE-604 | ||
005 | 20160316 | ||
007 | cr|uuu---uuuuu | ||
008 | 130506s2013 xx o|||| 00||| eng d | ||
020 | |a 9789400758605 |c Online |9 978-94-007-5860-5 | ||
024 | 7 | |a 10.1007/978-94-007-5860-5 |2 doi | |
035 | |a (OCoLC)827054239 | ||
035 | |a (DE-599)BVBBV040982614 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-898 |a DE-634 |a DE-573 |a DE-Aug4 |a DE-859 |a DE-706 |a DE-863 | ||
082 | 0 | |a 621.382 | |
110 | 2 | |a International Conference on IT Convergence and Security |e Verfasser |4 aut | |
245 | 1 | 0 | |a IT convergence and security 2012 |c Kuinam J. Kim ..., eds. |
264 | 1 | |a Dordrecht [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIX, 1242 p. 546 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in electrical engineering |v 215 | |
500 | |a From the Contents: Security Fundamentals -- Industrial & Business Information Security -- Security Protocols and Applications -- Convergence Security -- IT Convergence Applications -- Mobile Computing and Future Networks -- Multimedia and Information Visualization -- Convergence Data Mining and Artificial Intelligence -- Web Technology and Software Engineering -- Green Convergence Services | ||
520 | |a <p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. </p><p>The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.</p> | ||
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Engineering | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Telecommunication | |
700 | 1 | |a Kim, Kuinam J. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-94-007-5859-9 |
830 | 0 | |a Lecture notes in electrical engineering |v 215 |w (DE-604)BV042385829 |9 215 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-94-007-5860-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025960573 | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-634 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-Aug4 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-573 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-92 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-898 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-859 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-863 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-5860-5 |l DE-706 |p ZDB-2-ENG |x Verlag |3 Volltext |
Record in the Search Index
DE-BY-OTHR_katkey | 5269442 |
---|---|
_version_ | 1831256896275742720 |
adam_text | IT CONVERGENCE AND SECURITY 2012
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FROM THE CONTENTS: SECURITY FUNDAMENTALS
INDUSTRIAL & BUSINESS INFORMATION SECURITY
SECURITY PROTOCOLS AND APPLICATIONS
CONVERGENCE SECURITY
IT CONVERGENCE APPLICATIONS
MOBILE COMPUTING AND FUTURE NETWORKS
MULTIMEDIA AND INFORMATION VISUALIZATION
CONVERGENCE DATA MINING AND ARTIFICIAL INTELLIGENCE
WEB TECHNOLOGY AND SOFTWARE ENGINEERING
GREEN CONVERGENCE SERVICES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
IT CONVERGENCE AND SECURITY 2012
/
: 2013
ABSTRACT / INHALTSTEXT
THE PROCEEDINGS APPROACHES THE SUBJECT MATTER WITH PROBLEMS IN TECHNICAL
CONVERGENCE AND CONVERGENCES OF SECURITY TECHNOLOGY. THIS APPROACH IS
NEW BECAUSE WE LOOK AT NEW ISSUES THAT ARISE FROM TECHNIQUES CONVERGING.
THE GENERAL SCOPE OF THE PROCEEDINGS CONTENT IS CONVERGENCE SECURITY AND
THE LATEST INFORMATION TECHNOLOGY. THE INTENDED READERSHIP ARE
SOCIETIES, ENTERPRISES, AND RESEARCH INSTITUTES, AND INTENDED CONTENT
LEVEL IS MID- TO HIGHLY EDUCATED PERSONALS. THE MOST IMPORTANT FEATURES
AND BENEFITS OF THE PROCEEDINGS ARE THE INTRODUCTION OF THE MOST RECENT
INFORMATION TECHNOLOGY AND ITS RELATED IDEAS, APPLICATIONS AND PROBLEMS
RELATED TO TECHNOLOGY CONVERGENCE, AND ITS CASE STUDIES AND FINALLY AN
INTRODUCTION OF CONVERGING EXISTING SECURITY TECHNIQUES THROUGH
CONVERGENCE SECURITY. OVERALL, THROUGH THE PROCEEDINGS, AUTHORS WILL BE
ABLE TO UNDERSTAND THE MOST STATE OF THE ART INFORMATION STRATEGIES AND
TECHNOLOGIES OF CONVERGENCE SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Kim, Kuinam J. |
author2_role | edt |
author2_variant | k j k kj kjk |
author_corporate | International Conference on IT Convergence and Security |
author_corporate_role | aut |
author_facet | Kim, Kuinam J. International Conference on IT Convergence and Security |
author_sort | International Conference on IT Convergence and Security |
building | Verbundindex |
bvnumber | BV040982614 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)827054239 (DE-599)BVBBV040982614 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-94-007-5860-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04090nam a2200541zcb4500</leader><controlfield tag="001">BV040982614</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160316 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130506s2013 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789400758605</subfield><subfield code="c">Online</subfield><subfield code="9">978-94-007-5860-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-94-007-5860-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)827054239</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040982614</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">International Conference on IT Convergence and Security</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IT convergence and security 2012</subfield><subfield code="c">Kuinam J. Kim ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dordrecht [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 1242 p. 546 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in electrical engineering</subfield><subfield code="v">215</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">From the Contents: Security Fundamentals -- Industrial &amp; Business Information Security -- Security Protocols and Applications -- Convergence Security -- IT Convergence Applications -- Mobile Computing and Future Networks -- Multimedia and Information Visualization -- Convergence Data Mining and Artificial Intelligence -- Web Technology and Software Engineering -- Green Convergence Services</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"><p>The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. </p><p>The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.</p></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Kuinam J.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-94-007-5859-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in electrical engineering</subfield><subfield code="v">215</subfield><subfield code="w">(DE-604)BV042385829</subfield><subfield code="9">215</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025960573</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-5860-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040982614 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T16:28:39Z |
institution | BVB |
isbn | 9789400758605 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025960573 |
oclc_num | 827054239 |
open_access_boolean | |
owner | DE-92 DE-898 DE-BY-UBR DE-634 DE-573 DE-Aug4 DE-859 DE-706 DE-863 DE-BY-FWS |
owner_facet | DE-92 DE-898 DE-BY-UBR DE-634 DE-573 DE-Aug4 DE-859 DE-706 DE-863 DE-BY-FWS |
physical | 1 Online-Ressource (XIX, 1242 p. 546 illus) |
psigel | ZDB-2-ENG |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in electrical engineering |
series2 | Lecture notes in electrical engineering |
spellingShingle | IT convergence and security 2012 Lecture notes in electrical engineering Ingenieurwissenschaften Engineering Computer Communication Networks Telecommunication |
title | IT convergence and security 2012 |
title_auth | IT convergence and security 2012 |
title_exact_search | IT convergence and security 2012 |
title_full | IT convergence and security 2012 Kuinam J. Kim ..., eds. |
title_fullStr | IT convergence and security 2012 Kuinam J. Kim ..., eds. |
title_full_unstemmed | IT convergence and security 2012 Kuinam J. Kim ..., eds. |
title_short | IT convergence and security 2012 |
title_sort | it convergence and security 2012 |
topic | Ingenieurwissenschaften Engineering Computer Communication Networks Telecommunication |
topic_facet | Ingenieurwissenschaften Engineering Computer Communication Networks Telecommunication |
url | https://doi.org/10.1007/978-94-007-5860-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025960573&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV042385829 |
work_keys_str_mv | AT internationalconferenceonitconvergenceandsecurity itconvergenceandsecurity2012 AT kimkuinamj itconvergenceandsecurity2012 |