권호기사보기
기사명 | 저자명 | 페이지 | 원문 | 기사목차 |
---|
대표형(전거형, Authority) | 생물정보 | 이형(異形, Variant) | 소속 | 직위 | 직업 | 활동분야 | 주기 | 서지 | |
---|---|---|---|---|---|---|---|---|---|
연구/단체명을 입력해주세요. |
|
|
|
|
|
* 주제를 선택하시면 검색 상세로 이동합니다.
영문목차
Section 1. Fundamental Concepts and Theories : This section serves as a foundation for this exhaustive reference tool by addressing underlying principles essential to the understanding of IT Policy and Ethics. Chapters found within these pages provide an excellent framework in which to position IT Policy and Ethics within the field of information science and technology. Insight regarding the critical incorporation of global measures into IT Policy and Ethics is addressed, while crucial stumbling blocks of this field are explored. With 15 chapters comprising this foundational section, the reader can learn and chose from a compendium of expert research on the elemental theories underscoring the IT Policy and Ethics discipline.
Chapter 1. Introduction to Continuous Authentication / Issa Traoré [University of Victoria, Canada] ; Ahmed A.E. Ahmed [University of Victoria, Canada]=1
Chapter 2. Password Sharing and How to Reduce It / Ana Ferreira [Cintesis, Portugal & University of Kent, UK] ; Ricardo Correia [Cintesis, Portugal] ; David W Chadwick [University of Kent, UK] ; Henrique Santos [University of Minho, Portugal] ; Rui Gomes [Hospital Prof. Doutor Fernando Fonseca, Portugal] ; Diogo Reis [Hospital S. Sebastião, Portugal] ; Luis Antunes [Instituto de Telecomunicações, Portugal]=22
Chapter 3. Convergence of Fixed and Mobile Networks / Gábor Kovács [Budapest University of Technology and Economics, Hungary] ; Gábor Árpád Németh [Budapest University of Technology and Economics, Hungary] ; Zoltán Pap [Ericsson, Hungary]=43
Chapter 4. Trust Management and User's Trust Perception in e-Business / Elisa Costante [TU/e Eindhoven University of Technology, The Netherlands] ; Milan Petkovic [TU/e Eindhoven University of Technology, The Netherlands & Philips Research Europe, The Netherlands] ; Jerry den Hartog [TU/e Eindhoven University of Technology, The Netherlands]=64
Chapter 5. Study and Non-Study Related Technologies use of Flemish Students in Higher Education / Steven Bruneel [Katholieke Universiteit Leuven, Belgium] ; Jan Elen [Katholieke Universiteit Leuven, Belgium] ; Kurt De Wit [Katholieke Universiteit Leuven, Belgium] ; Jef C. Verhoeven [Katholieke Universiteit Leuven, Belgium]=84
Chapter 6. Stepwise E-Participation : Good Practice from the Regional Level in Europe / Francesco Molinari [University of Siena, Italy] ; Mateja Kunstelj [University of Ljubljana, Slovenia] ; Ljupčo Todorovski [University of Ljubljana, Slovenia]=105
Chapter 7. Public Key Infrastructure / Reed H. Petty [University of Arkansas at Little Rock, USA] ; Jiang Bian [University of Arkansas at Little Rock, USA] ; Remzi Seker [University of Arkansas at Little Rock, USA]=126
Chapter 8. Access Control in Federated Clouds : The Cloudgrid Case Study / Valentina Casola [University of Naples "Federico II", Italy] ; Antonio Cuomo [University of Sannio, Italy] ; Umberto Villano [University of Sannio, Italy] ; Massimiliano Rak [Second University of Naples, Italy]=148
Chapter 9. Learning, Unlearning, and Relearning : Using Web 2.0 Technologies to Support the Development of Lifelong Learning Skills / Joanna C. Dunlap [University of Colorado Denver, USA] ; Patrick R. Lowenthal [University of Colorado Denver, USA]=170
Chapter 10. The Evolution of KM Practices : The Case of the Renault-Nissan International Strategic Alliance / Nabyla Daidj [TELECOM Business School, France]=194
Chapter 11. Semantic Policies for Modeling Regulatory Process Compliance / Marwane El Kharbili [University of Luxemburg, Luxemburg] ; Elke Pulvermueller [University of Osnabrueck, Germany]=218
Chapter 12. Near Field Authentication / Vasileios Lakafosis [Georgia Institute of Technology, USA] ; Edward Gebara [Georgia Institute of Technology, USA] ; Manos M. Tentzeris [Georgia Institute of Technology, USA] ; Gerald DeJean [Microsoft Research, USA] ; Darko Kirovski [Microsoft Research, USA]=244
Chapter 13. Continuous Authentication in Computers / Harini Jagadeesan [Virginia Tech, USA] ; Michael S. Hsiao [Virginia Tech, USA]=268
Chapter 14. Grid Data Handling / Alexandru Costan [University Politehnica of Bucharest, Romania]=294
Chapter 15. Mass Media Strategies : Hybrid Approach Using a Bioinspired Algorithm and Social Data Mining / Carlos Alberto Ochoa Ortiz Zezzatti [Juarez City University México] ; Darwin Young [COMIMSA Centro Conacyt, Mexico] ; Camelia Chira [Babeş-Bolyai University, Romania] ; Daniel Azpeitia [Juarez City University, México] ; Alán Calvillo [Aguascalientes University, México]=322
Section 2. Tools and Technologies : This section presents an extensive coverage of various tools and technologies available in the field of IT Policy and Ethics that practitioners and academicians alike can utilize to develop different techniques. These chapters enlighten readers about fundamental research on the many tools facilitating the burgeoning field of IT Policy and Ethics. It is through these rigorously researched chapters that the reader is provided with countless examples of the up-and-coming tools and technologies emerging from the field of IT Policy and Ethics. With 15 chapters, this section offers a broad treatment of some of the many tools and technologies within the IT Policy and Ethics field.
Chapter 16. Reversible Information Hiding and Its Application to Image Authentication / Masaaki Fujiyoshi [Tokyo Metropolitan University, Japan] ; Hitoshi Kiya [Tokyo Metropolitan University, Japan]=349
Chapter 17. Applied Cryptography in Electronic Commerce / Sławomir Grzonkowski [National University of Ireland, Ireland] ; Brian D. Ensor [National University of Ireland, Ireland] ; Bill McDaniel [National University of Ireland, Ireland]=368
Chapter 18. Multimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication / P. Daphne Tsatsonlis [Carnegie Mellon University, USA] ; Aaron Jaech [Carnegie Mellon University, USA] ; Robert Batie [Raytheon Company, USA] ; Marios Saivvides [Carnegie Mellon University, USA]=389
Chapter 19. Continuous User Authentication Based on Keystroke Dynamics through Neural Network Committee Machines / Sérgio Roberto de Lima e Silva Filho [Bry Tecnologia S.A., Brazil] ; Mauro Roisenberg [Federal University of Santa Catarina, Brazil]=410
Chapter 20. Identity-Based Cryptography : Applications, Vulnerabilities, and Future Directions / Jenny Torres [University Pierre and Marie Curie, France] ; Michele Nogueira [Federal University of Parana, Brazil] ; Guy Pujolle [University Pierre and Marie Curie, France]=430
Chapter 21. Denial of Service Resilience of Authentication Systems / Valer Bocan [Alcatel-Lucent, Romania] ; Mihai Fagadar-Cosma [Alcatel-Lucent, Romania]=451
Chapter 22. Applied Cryptography in Wireless Sensor Networks / Dulal C. Kar [Texas A&M University-Corpus Christi, USA] ; Hung Ngo [Texas A&M University-Corpus Christi, USA] ; Clifton J. Mulkey [Texas A&M University-Corpus Christi, USA]=471
Chapter 23. A Hybrid Port-Knocking Technique for Host Authentication / Ali H. Hadi [Philadelphia University, Jordan] ; Hussein Al-Bahadili [Petra University, Jordan]=493
Chapter 24. mVITAL : A Standards Compliant Vital Sign Monitor / Yusuf Ozturk [San Diego State University, USA] ; Jayesh Sharma [San Diego State University, USA]=515
Chapter 25. IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA / Qazi Bouland Mussabbir [Brunel University, UK] ; Thomas John Owens [Brunel University, UK]=539
Chapter 26. Elliptic Curve Cryptography on WISPs / Michael Hutter [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria] ; Erich Wenger [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria] ; Markus Pelnar [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria] ; Christian Pendl [Institute for Applied Information Processing and Communications, Graz University of Technology, Austria]=562
Chapter 27. Point-of-Sale Technologies at Retail Stores : What Will The Future Be Like? / Richard Clodfelter [University of South Carolina, USA]=584
Chapter 28. A Keystroke Biometric System for Long-Text Input / Charles C. Tappert [Pace University, USA] ; Sung-Hyuk Cha [Pace University, USA] ; Mary Villani [Pace University, USA] ; Robert S. Zack [Pace University, USA]=609
영문목차
Chapter 29. An Electronic Contract Signing Protocol Using Fingerprint Biometrics / Harkeerat Bedi [University of Tennessee at Chattanooga, USA] ; Li Yang [University of Tennessee at Chattanooga, USA] ; Joseph M. Kizza [University of Tennessee at Chattanooga, USA]=635
Chapter 30. Brain-Like System for Audiovisual Person Authentication Based on Time-to-First Spike Coding / Simei Gomes Wysoski [Auckland University of Technology, New Zealand] ; Lubica Benuskova [University of Otago, New Zealand] ; Nikola Kasabov [Auckland University of Technology, New Zealand]=662
Section 3. Frameworks and Methodologies : This section provides in-depth coverage of conceptual architecture frameworks to provide the reader with a comprehensive understanding of the emerging developments within the field of IT Policy and Ethics. Research fundamentals imperative to the understanding of developmental processes within IT Policy and Ethics are offered. From broad examinations to specific discussions on methodology, the research found within this section spans the discipline while offering detailed, specific discussions. From basic designs to abstract development, these chapters serve to expand the reaches of development and design technologies within the IT Policy and Ethics community. This section includes 13 contributions from researchers throughout the world on the topic of IT Policy and Ethics.
Chapter 31. Using a Social Learning Community to Actively Engage Students' Participation in a Virtual Classroom / Fariel Mohan [University of Trinidad and Tobago, Trinidad and Tobago]=691
Chapter 32. MAC and PHY-Layer Network Coding for Applications in Wireless Communications Networks / Giulio Bartoli [University of Firenze, Italy] ; Francesco Chiti [University of Firenze, Italy] ; Romano Fantacci [University of Firenze, Italy] ; Dania Marabissi [University of Firenze, Italy] ; Andrea Tassi [University of Firenze, Italy]=706
Chapter 33. Key Management / Chuan-Kun Wu [Chinese Academy of Sciences, China]=728
Chapter 34. Creating Ongoing Online Support Communities through Social Networks to Promote Professional Learning / Maria Elena Corbeil [The University of Texas at Brownsville, USA] ; Joseph Rene Corbeil [The University of Texas at Brownsville, USA]=754
Chapter 35. Security Management in Heterogeneous Distributed Sensor Networks / Al-Sakib Khan Pathan [International Islamic University, Malaysia]=773
Chapter 36. A Method of Analysing the Use of Social Networking Sites in Business / Sanaa Askool [University of Reading, UK] ; Aimee Jacobs [University of Reading, UK] ; Keiichi Nakata [University of Reading, UK]=794
Chapter 37. Policy Management in Cloud : Challenges and Approaches / Hassan Takabi [University of Pittsburgh, USA] ; James B. D. Joshi [University of Pittsburgh, USA]=814
Chapter 38. Modeling Access Control in Healthcare Organizations / Efstratia Mourtou [St. Andrew General Hospital, Greece]=835
Chapter 39. An Access Control Model for Dynamic VR Applications / Adam Wójtowicz [Poznań University of Economics, Poland] ; Wojciech Cellary [Poznań University of Economics, Poland]=857
Chapter 40. Building a Cloud-Based Mobile Application Testbed / Hamilton Turner [Virginia Polytechnic Institute, USA] ; Jules White [Virginia Polytechnic Institute, USA] ; Jeff Reed [Virginia Polytechnic Institute, USA] ; José Galindo [Virginia Polytechnic Institute, USA] ; Adam Porter [University of Maryland, USA] ; Madhav Marathe [Virginia Polytechnic Institute, USA] ; Anil Vullikanti [Virginia Polytechnic Institute, USA] ; Aniruddha Gokhale [Vanderbilt University, USA]=879
Chapter 41. Developing Proactive Security Dimensions for SOA / Hany F. EL Yamany [Suez Canal University, Egypt] ; David S. Allison [The University of Western Ontario, Canada] ; Miriam A. M. Capretz [The University of Western Ontario, Canada]=900
Chapter 42. National Interoperability Frameworks : The Way Forward / Fenareti Lampathaki [National Technical University of Athens, Greece] ; Christos Tsiakaliaris [Planet S.A., Greece] ; Antonis Stasis [Hellenic Ministry of Interior, Greece] ; Yannis Charalabidis [National Technical University of Athens, Greece]=923
Chapter 43. Medium Access Control Protocols for Wireless Sensor Networks : Design Space, Challenges, and Future Directions / Pardeep Kumar [Free University Berlin, Germany] ; Mesut Güneş [Free University Berlin, Germany]=947
Section 4. Cases and Applications : This section discusses a variety of applications and opportunities available that can be considered by practitioners in developing viable and effective IT Policy and Ethics programs and processes. This section includes 13 chapters that review topics from case studies in the EU to best practices in Africa and ongoing research in the United States. Further chapters discuss IT Policy and Ethics in a variety of settings. Contributions included in this section provide excellent coverage of today's IT community and how research into IT Policy and Ethics is impacting the social fabric of our present-day global village.
Chapter 44. The Integration of Social Networking in Creating Collaborative Partnerships in Education / Larry S. Tinnerman [Indiana State University, USA] ; James Johnson [Indiana State University, USA]=976
Chapter 45. Audio Visual System for Large Scale People Authentication and Recognition over Internet Protocol(IP) / Sue Inn Ch'ng [Nottingham University Malaysia Campus, Malaysia] ; Kah Phooi Seng [Sunway University, Malaysia] ; Li-Minn Ang [Nottingham University Malaysia Campus, Malaysia] ; Fong Tien Ong [Nottingham University Malaysia Campus, Malaysia]=997
Chapter 46. Music is the Key : Using our Enduring Memory for Songs to Help Users Log On / Marcia Gibson [Institute for Research in Applicable Computing, University of Bedfordshire, UK] ; Karen Renaud [University of Glasgow, UK] ; Marc Conrad [Institute for Research in Applicable Computing, University of Bedfordshire, UK] ; Carsten Maple [Institute for Research in Applicable Computing, University of Bedfordshire, UK]=1018
Chapter 47. Investigating the Performance of the TSS Scheme in Noisy MANETs / Hussein Al-Bahadili [Petra University, Jordan] ; Shakir M. Hussain [Petra University, Jordan] ; Ghassan F. Issa [Petra University, Jordan] ; Khaled El-Zayyat [Al-Ahliyya Amman University, Jordan]=1038
Chapter 48. Secure Exchange of Electronic Health Records / Alejandro Enrique Flores [University of Wollongong, Australia] ; Khin Than Win [University of Wollongong, Australia] ; Willy Susilo [University of Wollongong, Australia]=1059
Chapter 49. RBAC with Generic Rights, Delegation, Revocation, and Constraints / Jacques Wainer [University of Campinas, Brazil] ; Fabio Negrello [University of Campinas, Brazil] ; Igor Ribeiro de Assis [University of Campinas, Brazil]=1080
Chapter 50. E-Simulations for Educating the Professions in Blended Learning Environments / Dale Holt [Deakin University, Australia] ; Stephen Segrave [Deakin University, Australia] ; Jacob Cybulski [Deakin University, Australia]=1102
Chapter 51. Crowdfunding to Improve Environmental Projects' Logistics / Carlos Alberto Ochoa Ortiz Zezzatti [Juarez City University, México] ; Sandra Bustillos [Juarez City University, Mexico] ; Yarira Reyes [Juarez City University, Mexico] ; Alessandra Tagliarducci-Tcherassi [Universitá Della Sapienza, Italy] ; Rubén Jaramillo [LAPEM/CIATEC, Mexico]=1124
Chapter 52. Youth and Online Social Networking : From Local Experiences to Public Discourses / Malene Charlotte Larsen [Aalborg University, Denmark] ; Thomas Ryberg [Aalborg University, Denmark]=1145
Chapter 53. Online Political Participation in the 2008 U.S. Presidential Election : Examining the Democratic Divide / Taewoo Nam [University at Albany, State University of New York, USA] ; Djoko Sigit Sayogo [University at Albany, State University of New York, USA]=1169
Chapter 54. The Role of Social Networking in Civilizational Development : Towards Better Communication and Reasoning in the Global Virtual Nation and Virtual Nation / Andrew Targowski [Western Michigan University, USA]=1193
Chapter 55. Technological Approaches to Maintaining Academic Integrity in Management Education / William Heisler [Troy University, USA] ; Fred Westfall [Troy University, USA] ; Robert Kitahara [Troy University, USA]=1218
Chapter 56. Improving the Effectiveness of Advertising in Internet Social Networking / Francisco Rejón-Guardia [University of Granada, Spain] ; Juan Sánchez-Fernández [University of Granada, Spain] ; Francisco Muñoz-Leiva [University of Granada, Spain]=1244
영문목차
Section 5. Issues and Challenges : This section contains 14 chapters, giving a wide variety of perspectives on IT Policy and Ethics and its implications. Such perspectives include reading in privacy, security, trust, ethics, and many more. The section also discusses new ethical considerations within transparency and accountability. Within the chapters, the reader is presented with an in-depth analysis of the most current and relevant issues within this growing field of study. Crucial questions are addressed and alternatives offered, and topics discussed such as interprofessional care, ethical guidelines, health, interoperability, and much more.
Chapter 57. Security Policy Issues in Internet Banking in Malaysia / Normalini Md Kassim [University Science of Malaysia, Malaysia] ; T. Ramayah [University Science of Malaysia, Malaysia]=1274
Chapter 58. Caught in the Web : The Internet and the Demise of Medical Privacy / Keith A. Bauer [Jefferson College of Health Sciences, USA]=1294
Chapter 59. Gender Differences in Social Networking Presence Effects on Web-Based Impression Formation / Leslie Jordan Albert [San Jose State University, USA] ; Timothy R. Hill [San Jose State University, USA] ; Shailaja Venkatsubramanyan [San Jose State University, USA]=1315
Chapter 60. Sociocognitive Inquiry / Brian R. Gaines [University of Victoria, Canada] ; Mildred L. G. Shaw [University of Calgary, Canada]=1336
Chapter 61. End-Users' Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture : Applying the UTAUT Model / Fahad AL Harby [University of Bradford, UK] ; Rami Qahwaji [University of Bradford, UK] ; Mumtaz Kamala [University of Bradford, UK]=1356
Chapter 62. Certification and Security Issues in Biomedical Grid Portals : The GRISSOM Case Study / Charalampos Doukas [University of the Aegean, Greece] ; Ilias Maglogiannis [University of Central Greece, Greece] ; Aristotle Chatziioannou [National Hellenic Research Foundation, Greece]=1377
Chapter 63. Web Services Composition Problem : Model and Complexity / Fahima Cheikh [Université de Toulouse, France]=1400
Chapter 64. Policy and Issues in Deploying Automated Plagiarism Detection Systems in Academic Communities : A Case Study of VeriGuide / Chi Hong Cheong [The Chinese University of Hong Kong, Hong Kong] ; Tak Pang Lau [The Chinese University of Hong Kong, Hong Kong] ; Irwin King [The Chinese University of Hong Kong, Hong Kong]=1425
Chapter 65. The Paradox of the Interactive Web in the U.S. Public Sector / Ines A. Mergel [Syracuse University, USA] ; Charles M. Schweik [University of Massachusetts, USA]=1451
Chapter 66. A Game Theoretical Approach to Design : A MAC Protocol for Wireless Sensor Networks / S. Mehta [Wireless Communications Research Center, Inha University, Korea] ; B. H. Kim [Korea Railroad Research Institute, Korea] ; K.S. Kwak [Wireless Communications Research Center, Inha University, Korea]=1475
Chapter 67. Cognitive Cooperation in Wireless Networks / Eng Hwee Ong [Nokia Research Center, Finland] ; Jamil Y. Khan [The University of Newcastle, Australia]=1498
Chapter 68. Security and Trust in a Global Research Infrastructure / Jens Jensen [Science and Technology Facilities Council, UK] ; David L. Groep [National Institute for Subatomic Physics, the Netherlands]=1523
Chapter 69. Social Networking and Identity / Rachel Barker [University of South Africa, South Africa]=1551
Chapter 70. Digital Convergence and Horizontal Integration Strategies / Troy J. Strader [Drake University, USA]=1579
Section 6. Emerging Trends : This section highlights research potential within the field of IT Policy and Ethics while exploring uncharted areas of study for the advancement of the discipline. Introducing this section are chapters that set the stage for future research directions and topical suggestions for continued debate, centering on the new venues and forums for discussion. A pair of chapters on the usability and effectiveness research makes up the middle of the section of the final 12 chapters, and the book concludes with a look ahead into the future of the IT Policy and Ethics field, with "Securing the External Interfaces of a Federated Infrastructure Cloud." 'In all, this text will serve as a vital resource to practitioners and academics interested in the best practices and applications of the burgeoning field of IT Policy and Ethics.
Chapter 71. Stepping over the Edge : The Implications of New Technologies for Education / Gráinne Conole [The Open University, UK]=1609
Chapter 72. Web 2.0 for eParticipation : Transformational Tweeting or Devaluation of Democracy? / Elizabeth Tait [University of Aberdeen, United Kingdom]=1631
Chapter 73. Privacy-Aware Organisation-Based Access Control Model(PrivOrBAC) / Nabil Ajam [Institut Télécom, Télécom Bretagne, France] ; Nora Cuppens-Boulahia [Institut Télécom, Télécom Bretagne, France] ; Fréderic Cuppens [Institut Télécom, Télécom Bretagne, France]=1656
Chapter 74. Internet Security Using Biometrics / Shrikant Tiwari [Institute of Technology, Banaras Hindu University, India] ; Aruni Singh [Institute of Technology, Banaras Hindu University, India] ; Ravi Shankar Singh [Institute of Technology, Banaras Hindu University, India] ; Sanjay K. Singh [Institute of Technology, Banaras Hindu University, India]=1680
Chapter 75. A Social Relational Network-Based Architecture for Maintaining the Media Integrity and Optimizing the Quality of Experience : A Technical and Business Perspective / Harilaos G. Koumaras [University of Bordeaux, France] ; Jose Oscar Fajardo [University of the Basque Country, Spain] ; Fidel Liberal [University of the Basque Country, Spain] ; Lingfen Sun [University of Plymouth, UK] ; Vaios Koumaras [Business College of Athens, Greece] ; Costas Troulos [PCN, Greece] ; Anastasios Kourtis [National Centre for Scientific Research Demokritos, Greece]=1708
Chapter 76. Towards Continuous Authentication Based on Gait Using Wearable Motion Recording Sensors / Mohammad Omar Derawi [Gjøvik University College, Norway] ; Davrondzhon Gafurov [Gjøvik University College, Norway] ; Patrick Bours [Gjøvik University College, Norway]=1730
Chapter 77. Using a Design Research Approach to Investigate the Knowledge-Building Implications of Online Social Networking and Other Web 2.0 Technologies in Higher Education Contexts / Cameron Richards [Universiti Teknologi, Malaysia]=1752
Chapter 78. Energy-Efficient MAC Protocols in Distributed Sensor Networks / Yupeng Hu [Hunan University, China] ; Rui Li [Hunan University, China]=1776
Chapter 79. RSU Deployment for Content Dissemination and Downloading in Intelligent Transportation Systems / Massimo Reineri [Politecnico di Torino, Italy] ; Claudio Casetti [Politecnico di Torino, Italy] ; Carla-Fabiana Chiasserini [Politecnico di Torino, Italy] ; Marco Fiore [INSA Lyon, INRIA, France] ; Oscar Trullols-Cruces [Universitat Politecnico de Catalunya, Spain] ; Jose M. Barcelo-Ordinas [Universitat Politecnica de Catalunya, Spain]=1798
Chapter 80. Cloud Environment Controls Assessment Framework / Bharat Shah [Lockheed Martin Corporation, USA]=1822
Chapter 81. Applying Continuous Authentication to Protect Electronic Transactions / Silas Leite Albuquerque [University of Brasilia, Brazil] ; Paulo Roberto de Lira Gondim [University of Brasilia, Brazil]=1848
Chapter 82. Securing the External Interfaces of a Federated Infrastructure Cloud / Philippe Massonet [Centre d'Excellence en Technologies de l'Information et de la Communication, Belgium] ; Arnaud Michot [Centre d'Excellence en Technologies de l'Information et de la Communication, Belgium] ; Syed Naqvi [Centre d'Excellence en Technologies de l'Information et de la Communication, Belgium] ; Massimo Villari [University of Messina, Italy] ; Joseph Latanicki [Thales Services, France]=1876
등록번호 | 청구기호 | 권별정보 | 자료실 | 이용여부 |
---|---|---|---|---|
0001830341 | 658.4038 -A13-14 | v.1 | 서울관 서고(열람신청 후 1층 대출대) | 이용가능 |
0001830342 | 658.4038 -A13-14 | v.2 | 서울관 서고(열람신청 후 1층 대출대) | 이용가능 |
0001830343 | 658.4038 -A13-14 | v.3 | 서울관 서고(열람신청 후 1층 대출대) | 이용가능 |
About the Author
Information Resources Management Association (IRMA) is a research-based professional organisation dedicated to advancing the concepts and practices of information resources management in modern organisations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals. IRMA brings together researchers, practitioners, academicians, and policy makers in information technology management from over 50 countries.*표시는 필수 입력사항입니다.
*전화번호 | ※ '-' 없이 휴대폰번호를 입력하세요 |
---|
기사명 | 저자명 | 페이지 | 원문 | 기사목차 |
---|
번호 | 발행일자 | 권호명 | 제본정보 | 자료실 | 원문 | 신청 페이지 |
---|
도서위치안내: / 서가번호:
우편복사 목록담기를 완료하였습니다.
*표시는 필수 입력사항입니다.
저장 되었습니다.