000 | 04046nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-642-32498-7 | ||
003 | DE-He213 | ||
005 | 20240423130158.0 | ||
007 | cr nn 008mamaa | ||
008 | 120814s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642324987 _9978-3-642-32498-7 |
||
024 | 7 |
_a10.1007/978-3-642-32498-7 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aMultidisciplinary Research and Practice for Informations Systems _h[electronic resource] : _bIFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings / _cedited by Gerald Quirchmayer, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXV, 683 p. 235 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v7465 |
|
505 | 0 | _aCross-Domain Applications: Aspects of Modeling and Validation -- Trust, Security, Privacy and Safety -- Mobile Applications -- Data Processing and Management -- Retrieval and Complex Query Processing -- E-Commerce -- International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD). | |
520 | _aThis book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012. | ||
650 | 0 | _aApplication software. | |
650 | 0 | _aData protection. | |
650 | 0 | _aInformation storage and retrieval systems. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aElectronic commerce. | |
650 | 0 | _aBusiness information services. | |
650 | 1 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aInformation Storage and Retrieval. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _ae-Commerce and e-Business. |
650 | 2 | 4 | _aIT in Business. |
700 | 1 |
_aQuirchmayer, Gerald. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBasl, Josef. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aYou, Ilsun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aXu, Lida. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aWeippl, Edgar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642324970 |
776 | 0 | 8 |
_iPrinted edition: _z9783642324994 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v7465 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-32498-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c185909 _d185909 |