omitir hasta el contenido
Network computing and information security : second international conference : proceedings Ver este material de antemano
CerrarVer este material de antemano
Chequeando…

Network computing and information security : second international conference : proceedings

Autor: Jingsheng Lei; et al
Editorial: Heidelberg : Springer, 2012.
Serie: Communications in computer and information science, 345
Edición/Formato:   Print book : Inglés (eng)Ver todas las ediciones y todos los formatos
Base de datos:WorldCat
Calificación:

(todavía no calificado) 0 con reseñas - Ser el primero.

Temas
Más materiales como éste

 

Encontrar un ejemplar en línea

Enlaces a este material

Encontrar un ejemplar en la biblioteca

&AllPage.SpinnerRetrieving; Encontrando bibliotecas que tienen este material…

Detalles

Género/Forma: Kongress
Tipo de material: Recurso en Internet
Tipo de documento: Libro/Texto, Recurso en Internet
Todos autores / colaboradores: Jingsheng Lei; et al
ISBN: 3642352103 9783642352102 9783642352119 3642352111
Número OCLC: 828074987
Descripción: 829 S : Ill.
Contenido: Applications of Cryptography.- Authentication and Non-repudiation.- Cloud Computing.- Communication and Information Systems.- Design and Analysis of Cryptographic Algorithms.- Information Hiding and Watermarking.- Intelligent Networked Systems.- Multimedia Computing and Intelligence.- Network and Wireless Network Security.- Network Communication.- Parallel and Distributed Systems.- Security Modeling and Architectures.- Sensor Network.- Signal and Information Processing.- Virtualization Techniques and Applications.- Wireless Network.
Título de la serie: Communications in computer and information science, 345
Responsabilidad: NCIS 2012, Shanghai, China, December 7-9, 2012 ; Jingsheng Lei ... [et al.] (eds.).
Más información:

Reseñas

Reseñas contribuidas por usuarios
Recuperando reseñas de GoodReads…
Recuperando reseñas de DOGObooks…

Etiquetas

Ser el primero.
Confirmar este pedido

Ya ha pedido este material. Escoja OK si desea procesar el pedido de todos modos.

Datos enlazados


Primary Entity

<http://www.worldcat.org/oclc/828074987> # Network computing and information security : second international conference : proceedings
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "828074987" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1207077285#Place/heidelberg> ; # Heidelberg
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/authentifikation> ; # Authentifikation
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/regelungssystem> ; # Regelungssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> ; # Telekommunikationsnetz
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> ; # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> ; # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> ; # NETWORK MONITORING (COMPUTER SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/informationssystem> ; # Informationssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> ; # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> ; # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> ; # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/netzwerktopologie> ; # Netzwerktopologie
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> ; # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/anwendungssystem> ; # Anwendungssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/verteiltes_system> ; # Verteiltes System
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> ; # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> ; # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> ; # CRYPTOGRAPHY (INFORMATION THEORY)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> ; # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/kryptologie> ; # Kryptologie
    schema:about <http://dewey.info/class/005.8/e22/ger/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> ; # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/datensicherung> ; # Datensicherung
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> ; # Jingsheng Lei
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> ; # International Conference on Network Computing and Information Security.
    schema:datePublished "2012" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1207077285> ;
    schema:genre "Kongress" ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> ; # Communications in computer and information science
    schema:name "Network computing and information security : second international conference : proceedings" ;
    schema:productID "828074987" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/828074987#PublicationEvent/heidelberg_springer_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1207077285#Agent/springer> ; # Springer
    schema:url <http://deposit.d-nb.de/cgi-bin/dokserv?id=4168095&prov=M&dok%5Fvar=1&dok%5Fext=htm> ;
    schema:workExample <http://worldcat.org/isbn/9783642352102> ;
    schema:workExample <http://worldcat.org/isbn/9783642352119> ;
    umbel:isLike <http://d-nb.info/102723934X> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/828074987> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> # International Conference on Network Computing and Information Security.
    a bgn:Meeting, schema:Event ;
    schema:name "International Conference on Network Computing and Information Security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> # Jingsheng Lei
    a schema:Person ;
    schema:familyName "Lei" ;
    schema:givenName "Jingsheng" ;
    schema:name "Jingsheng Lei" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> # Communications in computer and information science
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
    schema:name "Communications in computer and information science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
    schema:name "ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    a schema:Thing ;
    schema:name "CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> # CRYPTOGRAPHY (INFORMATION THEORY)
    a schema:Thing ;
    schema:name "CRYPTOGRAPHY (INFORMATION THEORY)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    a schema:Thing ;
    schema:name "DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    a schema:Thing ;
    schema:name "DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    a schema:Thing ;
    schema:name "KRYPTOGRAPHIE (INFORMATIONSTHEORIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> # NETWORK MONITORING (COMPUTER SYSTEMS)
    a schema:Thing ;
    schema:name "NETWORK MONITORING (COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    a schema:Thing ;
    schema:name "NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    a schema:Thing ;
    schema:name "SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
    schema:name "SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
    a schema:Thing ;
    schema:name "SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
    a schema:Thing ;
    schema:name "SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
    schema:name "Elektronische Unterschrift" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/informationssystem> # Informationssystem
    a schema:Intangible ;
    schema:name "Informationssystem" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/netzwerktopologie> # Netzwerktopologie
    a schema:Intangible ;
    schema:name "Netzwerktopologie" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> # Telekommunikationsnetz
    a schema:Intangible ;
    schema:name "Telekommunikationsnetz" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/verteiltes_system> # Verteiltes System
    a schema:Intangible ;
    schema:name "Verteiltes System" ;
    .

<http://worldcat.org/isbn/9783642352102>
    a schema:ProductModel ;
    schema:isbn "3642352103" ;
    schema:isbn "9783642352102" ;
    .

<http://worldcat.org/isbn/9783642352119>
    a schema:ProductModel ;
    schema:description "ebk." ;
    schema:isbn "3642352111" ;
    schema:isbn "9783642352119" ;
    .

<http://www.worldcat.org/title/-/oclc/828074987>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
    schema:dateModified "2015-04-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Cerrar ventana

Inicie una sesión con WorldCat 

¿No tienes una cuenta? Puede fácilmente crear una cuenta gratuita.