|
|
|
|
LEADER |
02538nam a22005655i 4500 |
001 |
7723 |
003 |
DE-He213 |
005 |
20130725193547.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642102332
|9 978-3-642-10233-2
|
024 |
7 |
# |
|a 10.1007/978-3-642-10233-2
|2 doi
|
050 |
# |
4 |
|a QA76.9.C66
|
072 |
# |
7 |
|a UBJ
|2 bicssc
|
072 |
# |
7 |
|a COM079000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
100 |
1 |
# |
|a Gal, Cecilia S.
|e editor.
|
245 |
1 |
0 |
|a Protecting Persons While Protecting the People
|b Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers /
|c edited by Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2009.
|
300 |
# |
# |
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 5661
|x 0302-9743 ;
|
520 |
# |
# |
|a This book constitutes the revised selected papers of the Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, held in New Brunswick, NJ, USA, in May 2008. The 11 revised full papers were carefully reviewed and selected from numerous submissions. The papers deal with the inherent tension between the need to gather intelligence necessary to protect the security of persons and nations, and the privacy rights of persons and organizations.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Data mining.
|
650 |
# |
0 |
|a Biometrics.
|
650 |
# |
0 |
|a Computers
|x Law and legislation.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Biometrics.
|
700 |
1 |
# |
|a Kantor, Paul B.
|e editor.
|
700 |
1 |
# |
|a Lesk, Michael E.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642102325
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 5661
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-10233-2
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|