LEADER 04531nam 22008535 450 001 9910255016303321 005 20200701042435.0 010 $a3-319-51064-9 024 7 $a10.1007/978-3-319-51064-4 035 $a(CKB)3710000001041260 035 $a(DE-He213)978-3-319-51064-4 035 $a(MiAaPQ)EBC6295182 035 $a(MiAaPQ)EBC5595820 035 $a(Au-PeEL)EBL5595820 035 $a(OCoLC)1076230994 035 $a(PPN)198340850 035 $a(EXLCZ)993710000001041260 100 $a20170103d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGlobal Security, Safety and Sustainability: The Security Challenges of the Connected World $e11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings /$fedited by Hamid Jahankhani, Alex Carlile, David Emm, Amin Hosseinian-Far, Guy Brown, Graham Sexton, Arshad Jamal 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 407 p. 121 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v630 300 $aIncludes index. 311 $a3-319-51063-0 327 $aThe future of digital forensics -- Cyber intelligence and operation -- Information systems security management -- Systems security, safety, and sustainability -- Cyber infrastructure protection. . 330 $aThis book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017. The 32 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on the future of digital forensics; cyber intelligence and operation; information systems security management; systems security, safety, and sustainability; cyber infrastructure protection. . 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v630 606 $aComputer security 606 $aData protection 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aComputers and civilization 606 $aComputer communication systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aData protection. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 14$aSystems and Data Security. 615 24$aSecurity. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aJahankhani$b Hamid$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCarlile$b Alex$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aEmm$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHosseinian-Far$b Amin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBrown$b Guy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSexton$b Graham$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJamal$b Arshad$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910255016303321 996 $aGlobal Security, Safety and Sustainability: The Security Challenges of the Connected World$92041913 997 $aUNINA