//]]>

Trustworthy Internet (Record no. 12406)

000 -LEADER
fixed length control field 04022nam a22004935i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310143357.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110614s2011 it | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788847018181
978-88-470-1818-1
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.382
Edition number 23
264 #1 -
-- Milano :
-- Springer Milan,
-- 2011.
912 ## -
-- ZDB-2-ENG
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Salgarelli, Luca.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Trustworthy Internet
Medium [electronic resource] /
Statement of responsibility, etc edited by Luca Salgarelli, Giuseppe Bianchi, Nicola Blefari-Melazzi.
300 ## - PHYSICAL DESCRIPTION
Extent XVIII, 369p. 84 illus.
Other physical details online resource.
520 ## - SUMMARY, ETC.
Summary, etc The term “trustworthy” has a very precise connotation in the European Community’s FP7 research program. For a network to be qualified as trustworthy, it needs to be secure, reliable and resilient to attacks and operational failures. Furthermore, quality of service must be guaranteed, while protecting user data, ensuring privacy and providing usable and trusted tools to support users in their security management. As such, the Trustworthy Internet not only has to include mechanisms, architectures and networking infrastructures that intrinsically provide basic security guarantees, but it also has to ensure users, service providers and application providers alike that their requirements in terms of Quality of Experience, manageability and efficiency are fully met. Providing such combined guarantees in a rapidly evolving, complex infrastructure such as the Internet requires solving challenging issues that encompass many fields of theoretical and applied information engineering. These issues span all levels of the protocol stack, ranging from finding new intrinsically secure transmission systems, to radically novel routing models, to new architectures for data dissemination and for interconnecting an unprecedented number of devices and appliances. This book aims at representing a view of the state of the “Trustworthy Internet” as we enter the second decade of our century. The material included in this book originated from the 21st International Tyrrhenian Workshop on Digital Communications, an event traditionally organized by CNIT, the Italian inter-university consortium for telecommunication research. The workshop comprised either invited contributions from renowned researchers with complementary expertise, as well as independent, peer-reviewed contributions stimulated through an open call for papers. This volume includes a selected subset of the workshop papers. Each contribution has been edited and extended after the workshop, taking into account the discussions carried out during the event, incorporating when appropriate additional technical material. Furthermore, the authors have strived to complement the specific technical aspects they present with background material devised to more comprehensively introduce the reader to the specific topic of trustworthiness tackled.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element Operating systems (Computers).
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Information systems.
Topical term or geographic name as entry element Telecommunication.
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element Communications Engineering, Networks.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Performance and Reliability.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Information Systems Applications (incl.Internet).
Topical term or geographic name as entry element Information Systems and Communication Service.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bianchi, Giuseppe.
Relator term editor.
Personal name Blefari-Melazzi, Nicola.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9788847018174
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-88-470-1818-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-03AUM Main Library2014-04-03 2014-04-03 E-Book   AUM Main Library621.382

Languages: 
English |
العربية