přejít na obsah
Network computing and information security : second international conference : proceedings Náhled dokumentu
ZavřítNáhled dokumentu
Probíhá kontrola...

Network computing and information security : second international conference : proceedings

Autor Jingsheng Lei; et al
Vydavatel: Heidelberg : Springer, 2012.
Edice: Communications in computer and information science, 345
Vydání/formát:   book_printbook : EnglishZobrazit všechny vydání a formáty
Databáze:WorldCat
Hodnocení:

(ještě nehodnoceno) 0 zobrazit recenze - Buďte první.

Předmětová hesla:
Více podobných

 

Najít online exemplář

Odkazy na tento dokument

Vyhledat exemplář v knihovně

&AllPage.SpinnerRetrieving; Vyhledávání knihoven, které vlastní tento dokument...

Detaily

Žánr/forma: Kongress
Typ materiálu: Internetový zdroj
Typ dokumentu: Book, Internet Resource
Všichni autoři/tvůrci: Jingsheng Lei; et al
ISBN: 3642352103 9783642352102 9783642352119 3642352111
OCLC číslo: 828074987
Popis: 829 S : Ill.
Obsahy: Applications of Cryptography.- Authentication and Non-repudiation.- Cloud Computing.- Communication and Information Systems.- Design and Analysis of Cryptographic Algorithms.- Information Hiding and Watermarking.- Intelligent Networked Systems.- Multimedia Computing and Intelligence.- Network and Wireless Network Security.- Network Communication.- Parallel and Distributed Systems.- Security Modeling and Architectures.- Sensor Network.- Signal and Information Processing.- Virtualization Techniques and Applications.- Wireless Network.
Název edice: Communications in computer and information science, 345
Odpovědnost: NCIS 2012, Shanghai, China, December 7-9, 2012 ; Jingsheng Lei ... [et al.] (eds.).
Více informací:

Recenze

Recenze vložené uživatelem
Nahrávání recenzí GoodReads...
Přebírání recenzí DOGO books...

Štítky

Buďte první.
Potvrdit tento požadavek

Tento dokument jste si již vyžádali. Prosím vyberte Ok pokud chcete přesto v žádance pokračovat.

Propojená data


Primary Entity

<http://www.worldcat.org/oclc/828074987> # Network computing and information security : second international conference : proceedings
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "828074987" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1207077285#Place/heidelberg> ; # Heidelberg
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/authentifikation> ; # Authentifikation
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/regelungssystem> ; # Regelungssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> ; # Telekommunikationsnetz
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> ; # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> ; # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> ; # NETWORK MONITORING (COMPUTER SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/informationssystem> ; # Informationssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> ; # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> ; # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> ; # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/netzwerktopologie> ; # Netzwerktopologie
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> ; # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/anwendungssystem> ; # Anwendungssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/verteiltes_system> ; # Verteiltes System
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> ; # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> ; # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> ; # CRYPTOGRAPHY (INFORMATION THEORY)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> ; # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/kryptologie> ; # Kryptologie
    schema:about <http://dewey.info/class/005.8/e22/ger/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> ; # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/datensicherung> ; # Datensicherung
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> ; # Jingsheng Lei
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> ; # International Conference on Network Computing and Information Security.
    schema:datePublished "2012" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1207077285> ;
    schema:genre "Kongress" ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> ; # Communications in computer and information science
    schema:name "Network computing and information security : second international conference : proceedings" ;
    schema:productID "828074987" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/828074987#PublicationEvent/heidelberg_springer_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1207077285#Agent/springer> ; # Springer
    schema:url <http://deposit.d-nb.de/cgi-bin/dokserv?id=4168095&prov=M&dok%5Fvar=1&dok%5Fext=htm> ;
    schema:workExample <http://worldcat.org/isbn/9783642352102> ;
    schema:workExample <http://worldcat.org/isbn/9783642352119> ;
    umbel:isLike <http://d-nb.info/102723934X> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/828074987> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> # International Conference on Network Computing and Information Security.
    a bgn:Meeting, schema:Event ;
    schema:name "International Conference on Network Computing and Information Security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> # Jingsheng Lei
    a schema:Person ;
    schema:familyName "Lei" ;
    schema:givenName "Jingsheng" ;
    schema:name "Jingsheng Lei" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> # Communications in computer and information science
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
    schema:name "Communications in computer and information science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
    schema:name "ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    a schema:Thing ;
    schema:name "CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> # CRYPTOGRAPHY (INFORMATION THEORY)
    a schema:Thing ;
    schema:name "CRYPTOGRAPHY (INFORMATION THEORY)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    a schema:Thing ;
    schema:name "DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    a schema:Thing ;
    schema:name "DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    a schema:Thing ;
    schema:name "KRYPTOGRAPHIE (INFORMATIONSTHEORIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> # NETWORK MONITORING (COMPUTER SYSTEMS)
    a schema:Thing ;
    schema:name "NETWORK MONITORING (COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    a schema:Thing ;
    schema:name "NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    a schema:Thing ;
    schema:name "SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
    schema:name "SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
    a schema:Thing ;
    schema:name "SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
    a schema:Thing ;
    schema:name "SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
    schema:name "Elektronische Unterschrift" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/informationssystem> # Informationssystem
    a schema:Intangible ;
    schema:name "Informationssystem" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/netzwerktopologie> # Netzwerktopologie
    a schema:Intangible ;
    schema:name "Netzwerktopologie" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> # Telekommunikationsnetz
    a schema:Intangible ;
    schema:name "Telekommunikationsnetz" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/verteiltes_system> # Verteiltes System
    a schema:Intangible ;
    schema:name "Verteiltes System" ;
    .

<http://worldcat.org/isbn/9783642352102>
    a schema:ProductModel ;
    schema:isbn "3642352103" ;
    schema:isbn "9783642352102" ;
    .

<http://worldcat.org/isbn/9783642352119>
    a schema:ProductModel ;
    schema:description "ebk." ;
    schema:isbn "3642352111" ;
    schema:isbn "9783642352119" ;
    .

<http://www.worldcat.org/title/-/oclc/828074987>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
    schema:dateModified "2015-04-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Zavřít okno

Prosím přihlaste se do WorldCat 

Nemáte účet? Můžete si jednoduše vytvořit bezplatný účet.