000 04203nam a22003975i 4500
001 300626
003 MX-SnUAN
005 20160429155637.0
007 cr nn 008mamaa
008 150903s2009 gw | o |||| 0|eng d
020 _a9783642040627
_99783642040627
024 7 _a10.1007/9783642040627
_2doi
035 _avtls000353806
039 9 _a201509030508
_bVLOAD
_c201405060326
_dVLOAD
_y201402181002
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.D35
100 1 _aJahankhani, Hamid.
_eeditor.
_9338158
245 1 0 _aGlobal Security, Safety, and Sustainability :
_b5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings /
_cedited by Hamid Jahankhani, Ali G. Hessami, Feng Hsu.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2009.
300 _brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v45
500 _aSpringer eBooks
505 0 _aQuestion: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush! -- A Security Audit Framework for Security Management in the Enterprise -- Watermarking Spatial Data in Geographic Information Systems -- Situation Awareness in Systems of Systems Ad-Hoc Environments -- The Georgia’s Cyberwar -- The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture -- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions -- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust -- A Systems Framework for Sustainability -- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path -- Geofencing in a Security Strategy Model -- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions -- The Significance of Security in Transmitting Clinical Data -- Security Concern over Earth Viewer Software Using Satellite Photo Service -- The People’s Republic of China – The Emerging Cyberpower -- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation -- Neural Networks for Intrusion Detection Systems -- Exploitation of Secrets Injected in Java Midlets -- Biometrically Based Electronic Signatures for a Public Networked Environment -- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain -- The Kido Botnet: Back to the Future -- Information Systems Security and Its Affiliation to Information Technology Risk Management -- A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea -- Hey – Get Off My Cloud! -- Static and Dynamic Analysis for Web Security in Generic Format.
520 _aThis book constitutes the refereed proceedings of the 5th International Conference, ICGS3, held in London, UK, in September 2009. The 28 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from many submissions. The two days conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aHessami, Ali G.
_eeditor.
_9338159
700 1 _aHsu, Feng.
_eeditor.
_9338160
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783642040610
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-04062-7
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c300626
_d300626