Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Kim, T'ae-hun (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin ; Heidelberg ; New York, NY Springer 2010
Schriftenreihe:Communications in computer and information science 122
Schlagworte:
Online-Zugang:DE-634
DE-M347
DE-473
DE-703
DE-20
DE-706
DE-739
Volltext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000 cb4500
001 BV036963202
003 DE-604
005 20150210
006 a |||| 10|||
007 cr|uuu---uuuuu
008 110118s2010 gw |||| o||u| ||||||eng d
016 7 |a 1008091456  |2 DE-101 
020 |a 9783642176104  |c Online  |9 978-3-642-17610-4 
024 7 |a 10.1007/978-3-642-17610-4  |2 doi 
035 |a (OCoLC)873719690 
035 |a (DE-599)DNB1008091456 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-M347  |a DE-473  |a DE-20  |a DE-703  |a DE-739  |a DE-706  |a DE-634 
082 0 |a 005.8  |2 22/ger 
084 |a 004  |2 sdnb 
245 1 0 |a Security technology, disaster recovery and business continuity  |b international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings  |c Tai-hoon Kim ... (eds.) 
264 1 |a Berlin ; Heidelberg ; New York, NY  |b Springer  |c 2010 
300 |a 1 Online-Ressource (XIII, 300 S.)  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Communications in computer and information science  |v 122 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kritische Infrastruktur  |0 (DE-588)7636249-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Elektronisches Wasserzeichen  |0 (DE-588)4572344-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Malware  |0 (DE-588)4687059-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Biometrie  |0 (DE-588)4124925-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2010  |z Cheju  |2 gnd-content 
689 0 0 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 0 1 |a Biometrie  |0 (DE-588)4124925-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 1 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 |5 DE-604 
689 2 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 2 1 |a Elektronisches Wasserzeichen  |0 (DE-588)4572344-8  |D s 
689 2 2 |a Malware  |0 (DE-588)4687059-3  |D s 
689 2 |5 DE-604 
689 3 0 |a Kritische Infrastruktur  |0 (DE-588)7636249-8  |D s 
689 3 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 3 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 3 3 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 3 |5 DE-604 
700 1 |a Kim, T'ae-hun  |0 (DE-588)139711155  |4 edt 
711 2 |a SecTech  |d 2010  |c Jeju  |j Sonstige  |0 (DE-588)16092146-6  |4 oth 
711 2 |a Future Generation Information Technology Conference  |n 2  |d 2010  |c Jeju  |j Sonstige  |0 (DE-588)16171493-6  |4 oth 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-3-642-17609-8 
830 0 |a Communications in computer and information science  |v 122  |w (DE-604)BV041227480  |9 122 
856 4 0 |u https://doi.org/10.1007/978-3-642-17610-4  |x Verlag  |3 Volltext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020878066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
912 |a ZDB-2-SCS 
966 e |u https://doi.org/10.1007/978-3-642-17610-4  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-17610-4  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-17610-4  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-17610-4  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-17610-4  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-17610-4  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-17610-4  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBG_katkey 2752246
_version_ 1811359615558877184
adam_text IMAGE 1 TABLE OF CONTENTS IMPACT OF FINGER TYPE IN FINGERPRINT AUTHENTICATION 1 DAVRONDZHON GAFUROV, PATRICK BOURS, BIAN YANG, AND CHRISTOPH BUSCH USING ARABIC CAPTCHA FOR CYBER SECURITY 8 BILAL KHAN, KHALED S. ALGHATHBAR, MUHAMMAD KHURRAM KHAN, ABDULLAH M. ALKELABI, AND ABDULAZIZ ALAJAJI INFORMATION ASSURANCE IN SAUDI ORGANIZATIONS - AN EMPIRICAL STUDY . . 18 SYED IRFAN NABI, ABDULRAHMAN A. MIRZA, AND KHALED ALGHATHBAR EMERGING BIOMETRIE MODALITIES: CHALLENGES AND OPPORTUNITIES 29 DAVRONDZHON GAFUROV ON DISTINGUISHED POINTS METHOD TO IMPLEMENT A PARALLEL COLLISION SEARCH ATTACK ON ECDLP 39 JU-SUNG KANG AND OK- YEON YI DATA CONFIDENTIALITY AND INTEGRITY ISSUES AND ROLE OF INFORMATION SECURITY MANAGEMENT STANDARD, POLICIES AND PRACTICES - AN EMPIRICAL STUDY OF TELECOMMUNICATION INDUSTRY IN PAKISTAN 47 SYED IRFAN NABI, SYED WAQAR NABI, SYED AWAIS AHMED TIPU, BUSHRA HAQQI, ZAHRA ABID, AND KHALED ALGHATHBAR EVALUATION OF PERFORMANCE OF SECURE OS USING PERFORMANCE EVALUATION MECHANISM OF LSM-BASED LSMPMON 57 KENJI YAMAMOTO AND TOSHIHIRO YAMAUCHI SAMPLE BYTES TO PROTECT IMPORTANT DATA FROM UNINTENTIONAL TRANSMISSION IN ADVANCED EMBEDDED DEVICE 68 BO-HEUNG CHUNG AND JUNG-NYE KIM SECURE OSGI PLATFORM AGAINST SERVICE INJECTION 74 INTAE KIM, KEEWOOK RIM, AND JUNGHYUN LEE A MECHANISM THAT BOUNDS EXECUTION PERFORMANCE FOR PROCESS GROUP FOR MITIGATING CPU ABUSE 84 TOSHIHIRO YAMAUCHI, TAKAYUKI KARA, AND HIDEO TANIGUCHI PROBABILISTIC ROUTE SELECTION ALGORITHM FOR IP TRACEBACK 94 HONG-BIN YIM AND JAE-IL JUNG BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008091456 DIGITALISIERT DURCH IMAGE 2 XII TABLE OF CONTENTS AN EFFICIENT AUDIO WATERMARKING ALGORITHM IN FREQUENCY DOMAIN FOR COPYRIGHT PROTECTION 104 PRANAB KUMAR DHAR, MOHAMMAD IBRAHIM KHAN, CHEOL-HONG KIM, AND JONG-MYON KIM ROBUST AUDIO WATERMARKING SCHEME BASED ON DETERMINISTIC PLUS STOCHASTIC MODEL 114 PRANAB KUMAR DHAR, CHEOL HONG KIM, AND JONG-MYON KIM HISTOGRAM-BASED REVERSIBLE DATA HIDING WITH QUADTREE CONCEPTS 126 HSIANG-CHEH HUANG, TING-HSUAN WANG, AND WAI-CHI FANG MAS: MAI WARE ANALYSIS SYSTEM BASED ON HARD WARE-ASSISTED VIRTUALIZATION TECHNOLOGY 134 TAEHYOUNG KIM, INHYUK KIM, CHANGWOO MIN, AND YOUNG IK EOM PERFORMANCE ANALYSIS OF CYBER SECURITY AWARENESS DELIVERY M E T H O D S . . 142 JEMAL ABAWAJY AND TAI-HOON KIM PROXY RE-ENCRYPTION WITH KEYWORD SEARCH: NEW DEFINITIONS AND ALGORITHMS 149 WEI-CHUEN YAU, RAPHAEL C.-W. PHAN, SWEE-HUAY HENG, AND BOK-MIN GOI ONE-TIME PASSWORD SYSTEM WITH INFINITE NESTED HASH CHAINS 161 MOHAMED HAMDY ELDEFRAWY, MUHAMMAD KHURRAM KHAN, AND KHALED ALGHATHBAR OPTIMAL INTELLIGENT SUPERVISORY CONTROL SYSTEM IN CYBER-PHYSICAL INTELLIGENCE 171 HOON KO AND ZITA VALE IMPROVED HIP-BASED INDIVIDUAL RECOGNITION USING WEARABLE MOTION RECORDING SENSOR 179 DAVRONDZHON GAFUROV AND PATRICK BOURS FUSION OF MOVING AND STATIC FACIAL FEATURES FOR ROBUST FACE RECOGNITION 187 DAKSHINA RANJAN KISKU, PHALGUNI GUPTA, AND JAMUNA KANTA SING HUMAN AUTHENTICATION BASED ON ECG WAVES USING RADON TRANSFORM 197 CHETANA HEGDE, H. RAHUL PRABHU, D.S. SAGAR, P. DEEPA SHENOY, K.R. VENUGOPAL, AND L.M. PATNAIK WIRELESS NETWORK SECURITY VULNERABILITIES AND CONCERNS 207 AHMAD MUSHTAQ FIGMENT AUTHENTICATION SCHEME IN WIRELESS SENSOR NETWORK 220 N. AMBIKA AND G.T. RAJU IMAGE 3 TABLE OF CONTENTS XIII ISSUES OF SECURITY AND NETWORK LOAD IN PRESENCE - A SURVEY 224 ZEESHAN SHAFI KHAN, KHALED ALGHATHBAR, MUHAMMAD SHER, AND KHALID RASHID DISCOVERING THE BOTNET DETECTION TECHNIQUES 231 ANEEL RAHIM AND FAHAD T. BIN MUHAYA CONTACTLESS BIOMETRICS IN WIRELESS SENSOR NETWORK: A SURVEY 236 MUHAMMAD IMRAN RAZZAK, MUHAMMAD KHURRAM KHAN, AND KHALED ALGHATHBAR A GENERIC APPROACH TO SECURITY ASSURED NET-CENTRIC COMMUNICATIONS NETWORK ARCHITECTURE FOR C4I SYSTEMS 244 ABDULLAH S. ALGHAMDI, SYED AMANULLAH QUADRI, IFTIKHAR AHMAD, AND KHALID AL-NAFJAN COLLABORATIVE GEOSPATIAL DATA AS APPLIED TO DISASTER RELIEF: HAITI 2010 250 A.J. CLARK, PATTON HOLLIDAY, ROBYN CHAU, HARRIS EISENBERG, AND MELINDA CHAU EFFECTS OF CHANGES IN LUGU LAKE WATER QUALITY ON SCHIZOTHORAX YUNNANSIS ECOLOGICAL HABITAT BASED ON HABITAT MODEL 259 WEI HUANG AND ARTHUR MYNNET INTERNET SCADA UTILIZING API'S AS DATA SOURCE 269 ROSSLIN JOHN ROBLES, HAENG-KON KIM, AND TAI-HOON KIM INSECURE INFORMATION SYSTEM'S SOLUTION USING ISOLATION METHOD 276 MARICEL BALITANAS AND TAI-HOON KIM COMMUNICATION SECURITY FOR CONTROL SYSTEMS IN SMART GRID 282 ROSSLIN JOHN ROBLES AND TAI-HOON KIM NMACA APPROACH USED TO BUILD A SECURE MESSAGE AUTHENTICATION CODE 290 RAED ALOSAIMY, KHALED ALGHATHBAR, ALAAELDIN M. HAFEZ, AND MOHAMED H. ELDEFRAWY AUTHOR INDEX 299
any_adam_object 1
author2 Kim, T'ae-hun
author2_role edt
author2_variant t h k thk
author_GND (DE-588)139711155
author_facet Kim, T'ae-hun
building Verbundindex
bvnumber BV036963202
collection ZDB-2-SCS
ctrlnum (OCoLC)873719690
(DE-599)DNB1008091456
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-642-17610-4
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 cb4500</leader><controlfield tag="001">BV036963202</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150210</controlfield><controlfield tag="006">a |||| 10|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">110118s2010 gw |||| o||u| ||||||eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1008091456</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642176104</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-17610-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-17610-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)873719690</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1008091456</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security technology, disaster recovery and business continuity</subfield><subfield code="b">international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings</subfield><subfield code="c">Tai-hoon Kim ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 300 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">122</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Cheju</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, T'ae-hun</subfield><subfield code="0">(DE-588)139711155</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">SecTech</subfield><subfield code="d">2010</subfield><subfield code="c">Jeju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16092146-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Future Generation Information Technology Conference</subfield><subfield code="n">2</subfield><subfield code="d">2010</subfield><subfield code="c">Jeju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16171493-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-642-17609-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">122</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">122</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=020878066&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2010 Cheju gnd-content
genre_facet Konferenzschrift 2010 Cheju
id DE-604.BV036963202
illustrated Illustrated
index_date 2024-09-19T15:27:00Z
indexdate 2024-09-27T16:20:28Z
institution BVB
institution_GND (DE-588)16092146-6
(DE-588)16171493-6
isbn 9783642176104
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-020878066
oclc_num 873719690
open_access_boolean
owner DE-M347
DE-473
DE-BY-UBG
DE-20
DE-703
DE-739
DE-706
DE-634
owner_facet DE-M347
DE-473
DE-BY-UBG
DE-20
DE-703
DE-739
DE-706
DE-634
physical 1 Online-Ressource (XIII, 300 S.) Ill., graph. Darst.
psigel ZDB-2-SCS
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher Springer
record_format marc
series Communications in computer and information science
series2 Communications in computer and information science
spellingShingle Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings
Communications in computer and information science
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Kritische Infrastruktur (DE-588)7636249-8 gnd
Elektronisches Wasserzeichen (DE-588)4572344-8 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Malware (DE-588)4687059-3 gnd
Biometrie (DE-588)4124925-2 gnd
subject_GND (DE-588)4011144-1
(DE-588)4070085-9
(DE-588)4330656-1
(DE-588)7636249-8
(DE-588)4572344-8
(DE-588)4830502-9
(DE-588)4274324-2
(DE-588)4687059-3
(DE-588)4124925-2
(DE-588)1071861417
title Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings
title_auth Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings
title_exact_search Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings
title_full Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings Tai-hoon Kim ... (eds.)
title_fullStr Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings Tai-hoon Kim ... (eds.)
title_full_unstemmed Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings Tai-hoon Kim ... (eds.)
title_short Security technology, disaster recovery and business continuity
title_sort security technology disaster recovery and business continuity international conferences sectech and drbc 2010 held as part of the future generation information technology conference fgit 2010 jeju island korea december 13 15 2010 proceedings
title_sub international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings
topic Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Kritische Infrastruktur (DE-588)7636249-8 gnd
Elektronisches Wasserzeichen (DE-588)4572344-8 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Malware (DE-588)4687059-3 gnd
Biometrie (DE-588)4124925-2 gnd
topic_facet Datensicherung
Rechnernetz
Authentifikation
Kritische Infrastruktur
Elektronisches Wasserzeichen
Kryptoanalyse
Computersicherheit
Malware
Biometrie
Konferenzschrift 2010 Cheju
url https://doi.org/10.1007/978-3-642-17610-4
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020878066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV041227480
work_keys_str_mv AT kimtaehun securitytechnologydisasterrecoveryandbusinesscontinuityinternationalconferencessectechanddrbc2010heldaspartofthefuturegenerationinformationtechnologyconferencefgit2010jejuislandkoreadecember13152010proceedings
AT sectechjeju securitytechnologydisasterrecoveryandbusinesscontinuityinternationalconferencessectechanddrbc2010heldaspartofthefuturegenerationinformationtechnologyconferencefgit2010jejuislandkoreadecember13152010proceedings
AT futuregenerationinformationtechnologyconferencejeju securitytechnologydisasterrecoveryandbusinesscontinuityinternationalconferencessectechanddrbc2010heldaspartofthefuturegenerationinformationtechnologyconferencefgit2010jejuislandkoreadecember13152010proceedings