Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Trustworthy computing and services =...
~
Yueming, Lu.
Linked to FindBook
Google Book
Amazon
博客來
Trustworthy computing and services = International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Trustworthy computing and services/ edited by Lu Yueming, Wu Xu, Zhang Xi.
Reminder of title:
International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
remainder title:
ISCTCS 2014
other author:
Yueming, Lu.
Published:
Berlin, Heidelberg :Springer Berlin Heidelberg : : 2015.,
Description:
xii, 414 p. :ill., digital ;24 cm.
[NT 15003449]:
Architecture for trusted computing systems -- Trusted computing platform -- Trusted system building; network and protocol security -- Mobile network security -- Network survivability, other critical theories and standard systems -- Credible assessment -- Credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile networks -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications.
Contained By:
Springer eBooks
Subject:
Computer security - Fiction. -
Online resource:
http://dx.doi.org/10.1007/978-3-662-47401-3
ISBN:
9783662474013 (electronic bk.)
Trustworthy computing and services = International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
Trustworthy computing and services
International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /[electronic resource] :ISCTCS 2014edited by Lu Yueming, Wu Xu, Zhang Xi. - Berlin, Heidelberg :Springer Berlin Heidelberg :2015. - xii, 414 p. :ill., digital ;24 cm. - Communications in computer and information science,5201865-0929 ;. - Communications in computer and information science ;247..
Architecture for trusted computing systems -- Trusted computing platform -- Trusted system building; network and protocol security -- Mobile network security -- Network survivability, other critical theories and standard systems -- Credible assessment -- Credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile networks -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications.
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.
ISBN: 9783662474013 (electronic bk.)
Standard No.: 10.1007/978-3-662-47401-3doiSubjects--Topical Terms:
1235111
Computer security
--Fiction.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Trustworthy computing and services = International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
LDR
:02753nam a2200349 a 4500
001
2007538
003
DE-He213
005
20160115154218.0
006
m d
007
cr nn 008maaau
008
160219s2015 gw s 0 eng d
020
$a
9783662474013 (electronic bk.)
020
$a
9783662474006 (paper)
024
7
$a
10.1007/978-3-662-47401-3
$2
doi
035
$a
978-3-662-47401-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UYD
$2
bicssc
072
7
$a
COM032000
$2
bisacsh
072
7
$a
COM067000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I77 2014
245
1 0
$a
Trustworthy computing and services
$h
[electronic resource] :
$b
International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014 : revised selected papers /
$c
edited by Lu Yueming, Wu Xu, Zhang Xi.
246
3
$a
ISCTCS 2014
260
$a
Berlin, Heidelberg :
$b
Springer Berlin Heidelberg :
$b
Imprint: Springer,
$c
2015.
300
$a
xii, 414 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
520
505
0
$a
Architecture for trusted computing systems -- Trusted computing platform -- Trusted system building; network and protocol security -- Mobile network security -- Network survivability, other critical theories and standard systems -- Credible assessment -- Credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile networks -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications.
520
$a
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.
650
0
$a
Computer security
$v
Fiction.
$3
1235111
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
1244118
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Computer System Implementation.
$3
892710
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
System Performance and Evaluation.
$3
891353
650
2 4
$a
Performance and Reliability.
$3
893430
700
1
$a
Yueming, Lu.
$3
2156399
700
1
$a
Xu, Wu.
$3
2156400
700
1
$a
Xi, Zhang.
$3
2156401
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Communications in computer and information science ;
$v
247.
$3
1567602
856
4 0
$u
http://dx.doi.org/10.1007/978-3-662-47401-3
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9273243
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I77 2014
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login