000 03597nam a22005415i 4500
001 978-94-007-2911-7
003 DE-He213
005 20140220083343.0
007 cr nn 008mamaa
008 111206s2012 ne | s |||| 0|eng d
020 _a9789400729117
_9978-94-007-2911-7
024 7 _a10.1007/978-94-007-2911-7
_2doi
050 4 _aTK1-9971
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
082 0 4 _a621.382
_223
100 1 _aKim, Kuinam J.
_eeditor.
245 1 0 _aProceedings of the International Conference on IT Convergence and Security 2011
_h[electronic resource] /
_cedited by Kuinam J. Kim, Seong Jin Ahn.
264 1 _aDordrecht :
_bSpringer Netherlands,
_c2012.
300 _aXIII, 639p. 271 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1100 ;
_v120
505 0 _aPart 1 Security Fundamentals -- Part 2 Industrial & Business Information Security -- Part 3 Security Protocols and Applications -- Part 4 Convergence Security -- Part 5 IT Convergence Applications -- Part 6 Mobile Computing and Future Networks -- Part 7 Multimedia and Information Visualization -- Part 8 Web Technology and Software Engineering.
520 _aAs we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1.      Introduction of the most recent information technology and its related ideas 2.      Applications and problems related to technology convergence, and its case studies 3.      Introduction of converging existing security techniques through convergence security Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.
650 0 _aEngineering.
650 0 _aSoftware engineering.
650 0 _aData protection.
650 0 _aData mining.
650 0 _aArtificial intelligence.
650 0 _aTelecommunication.
650 1 4 _aEngineering.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aSystems and Data Security.
650 2 4 _aSoftware Engineering.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aArtificial Intelligence (incl. Robotics).
700 1 _aAhn, Seong Jin.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9789400729100
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1100 ;
_v120
856 4 0 _uhttp://dx.doi.org/10.1007/978-94-007-2911-7
912 _aZDB-2-ENG
999 _c104605
_d104605