It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:265986617:2782
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:265986617:2782?format=raw

LEADER: 02782nam a22005175a 4500
001 014199253-0
005 20141107200527.0
008 140903s2014 gw | s ||0| 0|eng d
020 $a9783319109756
020 $a9783319109756
020 $a9783319109749
024 7 $a10.1007/978-3-319-10975-6$2doi
035 $a(Springer)9783319109756
040 $aSpringer
050 4 $aQA76.76.A65
072 7 $aUNH$2bicssc
072 7 $aUDBD$2bicssc
072 7 $aCOM032000$2bisacsh
082 04 $a005.7$223
100 1 $aTeufel, Stephanie,$eeditor.
245 10 $aAvailability, Reliability, and Security in Information Systems :$bIFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings /$cedited by Stephanie Teufel, Tjoa A Min, Ilsun You, Edgar Weippl.
264 1 $aCham :$bSpringer International Publishing :$bImprint: Springer,$c2014.
300 $aXII, 311 p. 111 illus.$bonline resource.
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file$bPDF$2rda
490 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v8708
505 0 $aKnowledge Management -- Software Security -- Mobile and Social Computing -- Security and Cognitive Informatics -- Homeland Defense.
520 $aThis volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
650 24 $aInformation Systems Applications (incl. Internet)
650 10 $aComputer science.
650 0 $aComputer science.
650 0 $aData protection.
650 0 $aComputer software.
650 0 $aBiometrics.
650 24 $aSystems and Data Security.
650 24 $aBiometrics.
650 24 $aAlgorithm Analysis and Problem Complexity.
700 1 $aWeippl, Edgar,$eeditor.
700 1 $aYou, Ilsun,$eeditor.
700 1 $aMin, Tjoa A.,$eeditor.
776 08 $iPrinted edition:$z9783319109749
830 0 $aLecture Notes in Computer Science ;$v8708.
988 $a20141002
906 $0VEN