000 | 03013nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-10975-6 | ||
003 | DE-He213 | ||
005 | 20200421112550.0 | ||
007 | cr nn 008mamaa | ||
008 | 140903s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319109756 _9978-3-319-10975-6 |
||
024 | 7 |
_a10.1007/978-3-319-10975-6 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUNH _2bicssc |
|
072 | 7 |
_aUDBD _2bicssc |
|
072 | 7 |
_aCOM032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.7 _223 |
245 | 1 | 0 |
_aAvailability, Reliability, and Security in Information Systems _h[electronic resource] : _bIFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings / _cedited by Stephanie Teufel, Tjoa A Min, Ilsun You, Edgar Weippl. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 311 p. 111 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8708 |
|
505 | 0 | _aKnowledge Management -- Software Security -- Mobile and Social Computing -- Security and Cognitive Informatics -- Homeland Defense. | |
520 | _aThis volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aBiometrics (Biology). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aBiometrics. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
700 | 1 |
_aTeufel, Stephanie. _eeditor. |
|
700 | 1 |
_aMin, Tjoa A. _eeditor. |
|
700 | 1 |
_aYou, Ilsun. _eeditor. |
|
700 | 1 |
_aWeippl, Edgar. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319109749 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8708 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-10975-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c58822 _d58822 |