LEADER 03250oam 2200673I 450 001 9910451041003321 005 20200520144314.0 010 $a0-429-17733-X 010 $a1-4822-6789-6 010 $a0-203-21287-8 010 $a1-280-05024-1 010 $a0-7484-0706-5 010 $a9786610050246 024 7 $a10.1201/9781482267891 035 $a(CKB)1000000000250415 035 $a(EBL)171981 035 $a(OCoLC)475879583 035 $a(SSID)ssj0000297824 035 $a(PQKBManifestationID)11223435 035 $a(PQKBTitleCode)TC0000297824 035 $a(PQKBWorkID)10343894 035 $a(PQKB)11453240 035 $a(MiAaPQ)EBC171981 035 $a(Au-PeEL)EBL171981 035 $a(CaPaEBR)ebr10062937 035 $a(CaONFJC)MIL5024 035 $a(OCoLC)1000433947 035 $a(EXLCZ)991000000000250415 100 $a20180706d1998 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGovernments and geographic information /$fIan Masser 210 1$aLondon ;$aBristol, Pa. :$cTaylor & Francis,$d1998. 215 $a1 online resource (138 p.) 300 $aDescription based upon print version of record. 311 $a0-203-29113-1 311 $a0-7484-0789-8 320 $aIncludes bibliographical references (p. 109-115) and index. 327 $aBook Cover; Title; Contents; List of figures and tables; Preface; The Emergence of National Geographic Information Strategies; What is Geographic Information and why is it so important?; Britain The Creation of a National Digital Topographic Database; The Netherlands The Emergence of a National Geographic Information Strategy; Australia The Commonwealth Dimension of State Geographic Information Strategies; The United States The National Spatial Data Infrastructure in Perspective; What Lessons Can Be Learnt From These Experiences?; References; Index 330 $aModern geographic information systems technology has transformed spatial data handling capabilities and made it necessary for governments to rethink their roles with respect to the supply and availability of geographic information.; The nature of the relationship between governments and geographic information is explored in this book from a number of different conceptual positions with reference to the experiences of Britain, the Netherlands, Austria and the United States and particularly with respect to the development of national geographic information strategies.; The book examines the role 606 $aGeographic information systems$xGovernment policy 606 $aInformation storage and retrieval systems$xGeography$xGovernment policy 606 $aGeographic information systems 608 $aElectronic books. 615 0$aGeographic information systems$xGovernment policy. 615 0$aInformation storage and retrieval systems$xGeography$xGovernment policy. 615 0$aGeographic information systems. 676 $a025.06/91 700 $aMasser$b Ian$0103100 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451041003321 996 $aGovernments and geographic information$91957963 997 $aUNINA LEADER 05860nam 22007095 450 001 9910483379903321 005 20251226203546.0 010 $a3-319-03584-3 024 7 $a10.1007/978-3-319-03584-0 035 $a(CKB)3710000000031246 035 $a(DE-He213)978-3-319-03584-0 035 $a(SSID)ssj0001067337 035 $a(PQKBManifestationID)11574597 035 $a(PQKBTitleCode)TC0001067337 035 $a(PQKBWorkID)11079687 035 $a(PQKB)10759649 035 $a(MiAaPQ)EBC3096920 035 $a(PPN)176108173 035 $a(EXLCZ)993710000000031246 100 $a20131107d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace Safety and Security $e5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings /$fedited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan 205 $a1st ed. 2013. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2013. 215 $a1 online resource (XXVI, 480 p. 149 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8300 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-03583-5 327 $aA Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data. 330 $aThis book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8300 606 $aData protection 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCryptology 606 $aComputers and Society 615 0$aData protection. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputers and Society. 676 $a005.8 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRay$b Indrakshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFeng$b Dengguo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRajarajan$b M.$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483379903321 996 $aCyberspace Safety and Security$92174991 997 $aUNINA