|
|
|
|
LEADER |
03012nam a22005535i 4500 |
001 |
978-3-319-10975-6 |
003 |
DE-He213 |
005 |
20151123194303.0 |
007 |
cr nn 008mamaa |
008 |
140903s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319109756
|9 978-3-319-10975-6
|
024 |
7 |
|
|a 10.1007/978-3-319-10975-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UNH
|2 bicssc
|
072 |
|
7 |
|a UDBD
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.7
|2 23
|
245 |
1 |
0 |
|a Availability, Reliability, and Security in Information Systems
|h [electronic resource] :
|b IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings /
|c edited by Stephanie Teufel, Tjoa A Min, Ilsun You, Edgar Weippl.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XII, 311 p. 111 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8708
|
505 |
0 |
|
|a Knowledge Management -- Software Security -- Mobile and Social Computing -- Security and Cognitive Informatics -- Homeland Defense.
|
520 |
|
|
|a This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Teufel, Stephanie.
|e editor.
|
700 |
1 |
|
|a Min, Tjoa A.
|e editor.
|
700 |
1 |
|
|a You, Ilsun.
|e editor.
|
700 |
1 |
|
|a Weippl, Edgar.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319109749
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8708
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-10975-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|