|
|
|
|
LEADER |
03631nam a22005415i 4500 |
001 |
978-94-007-2911-7 |
003 |
DE-He213 |
005 |
20151121052107.0 |
007 |
cr nn 008mamaa |
008 |
111206s2012 ne | s |||| 0|eng d |
020 |
|
|
|a 9789400729117
|9 978-94-007-2911-7
|
024 |
7 |
|
|a 10.1007/978-94-007-2911-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
245 |
1 |
0 |
|a Proceedings of the International Conference on IT Convergence and Security 2011
|h [electronic resource] /
|c edited by Kuinam J. Kim, Seong Jin Ahn.
|
264 |
|
1 |
|a Dordrecht :
|b Springer Netherlands :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIV, 642 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 120
|
505 |
0 |
|
|a Part 1 Security Fundamentals -- Part 2 Industrial & Business Information Security -- Part 3 Security Protocols and Applications -- Part 4 Convergence Security -- Part 5 IT Convergence Applications -- Part 6 Mobile Computing and Future Networks -- Part 7 Multimedia and Information Visualization -- Part 8 Web Technology and Software Engineering.
|
520 |
|
|
|a As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1. Introduction of the most recent information technology and its related ideas 2. Applications and problems related to technology convergence, and its case studies 3. Introduction of converging existing security techniques through convergence security Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
700 |
1 |
|
|a Kim, Kuinam J.
|e editor.
|
700 |
1 |
|
|a Ahn, Seong Jin.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789400729100
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 120
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-94-007-2911-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|