000 | 03357nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-319-24315-3 | ||
003 | DE-He213 | ||
005 | 20200421112041.0 | ||
007 | cr nn 008mamaa | ||
008 | 150919s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319243153 _9978-3-319-24315-3 |
||
024 | 7 |
_a10.1007/978-3-319-24315-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation and Communication Technology _h[electronic resource] : _bThird IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings / _cedited by Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXIV, 354 p. 119 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9357 |
|
520 | _aThis book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as part of the 23rd IFIP World Computer Congress, WCC 2015, in Daejeon, Korea, in October 2015. The 35 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers have been organized in the following topical sections: networks and systems architecture; teaching and education; authentication and profiling; data management and information advertizing; applied modeling and simulation; network security; dependable systems and applications, multimedia security; cryptography; big data and text mining, and social impact of EIS and visualization. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aInformation technology. | |
650 | 0 |
_aBusiness _xData processing. |
|
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputers. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Applications. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aIT in Business. |
700 | 1 |
_aKhalil, Ismail. _eeditor. |
|
700 | 1 |
_aNeuhold, Erich. _eeditor. |
|
700 | 1 |
_aTjoa, A Min. _eeditor. |
|
700 | 1 |
_aXu, Li Da. _eeditor. |
|
700 | 1 |
_aYou, Ilsun. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319243146 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9357 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-24315-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c56642 _d56642 |