1 option
Information and Communication Technology : Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings / edited by Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI ; SL 3, 9357
- Information Systems and Applications, incl. Internet/Web, and HCI ; 9357
- Language:
- English
- Subjects (All):
- Data protection.
- Application software.
- Computer networks.
- Computers and civilization.
- Business information services.
- Data and Information Security.
- Computer and Information Systems Applications.
- Computer Communication Networks.
- Computers and Society.
- IT in Business.
- Local Subjects:
- Data and Information Security.
- Computer and Information Systems Applications.
- Computer Communication Networks.
- Computers and Society.
- IT in Business.
- Physical Description:
- 1 online resource (XIV, 354 pages) : 119 illustrations in color.
- Edition:
- 1st ed. 2015.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2015.
- System Details:
- text file PDF
- Summary:
- This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as part of the 23rd IFIP World Computer Congress, WCC 2015, in Daejeon, Korea, in October 2015. The 35 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers have been organized in the following topical sections: networks and systems architecture; teaching and education; authentication and profiling; data management and information advertizing; applied modeling and simulation; network security; dependable systems and applications, multimedia security; cryptography; big data and text mining, and social impact of EIS and visualization.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-24315-3
- 9783319243153
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.