Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1073
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dey, Nilanjan. ; | en_US |
dc.contributor.author | Babo, Rosalina. ; | en_US |
dc.contributor.author | Ashour, Amira S. ; | en_US |
dc.contributor.author | Bhatnagar, Vishal. ; | en_US |
dc.contributor.author | Bouhlel, Med Salim. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:48Z | - |
dc.date.available | 2020-05-17T08:24:48Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319900599 ; | en_US |
dc.identifier.isbn | 9783319900582 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1073 | - |
dc.description | 005.437 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319900582. ; | en_US |
dc.description | QA76.9.H85 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 4.019 ; 23 ; | en_US |
dc.description.abstract | The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting usersee information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patientsee medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international expertsee panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems. ; | en_US |
dc.description.statementofresponsibility | edited by Nilanjan Dey, Rosalina Babo, Amira S. Ashour, Vishal Bhatnagar, Med Salim Bouhlel. | en_US |
dc.format.extent | XII, 171 p. 31 illus., 25 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319900582.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Knowledge management. ; | en_US |
dc.subject | Emergency medicine. ; | en_US |
dc.subject | Special Purpose Computers | en_US |
dc.subject | User interfaces and Computer Systems | en_US |
dc.subject | Application Software | en_US |
dc.subject | Computer Science | en_US |
dc.subject | User Interfaces and Human Computer Interaction | en_US |
dc.subject | Computer Appl. in Social and Behavioral Sciences. ; | en_US |
dc.subject | Knowledge Management. ; | en_US |
dc.subject | Emergency Services. ; | en_US |
dc.subject | Special Purpose and Application-Based Systems. ; | en_US |
dc.title | Social Networks Science: Design, Implementation, Security, and Challenges | en_US |
dc.title.alternative | From Social Networks Analysis to Social Networks Intelligence / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319900582.pdf | 3.95 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dey, Nilanjan. ; | en_US |
dc.contributor.author | Babo, Rosalina. ; | en_US |
dc.contributor.author | Ashour, Amira S. ; | en_US |
dc.contributor.author | Bhatnagar, Vishal. ; | en_US |
dc.contributor.author | Bouhlel, Med Salim. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:48Z | - |
dc.date.available | 2020-05-17T08:24:48Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319900599 ; | en_US |
dc.identifier.isbn | 9783319900582 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1073 | - |
dc.description | 005.437 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319900582. ; | en_US |
dc.description | QA76.9.H85 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 4.019 ; 23 ; | en_US |
dc.description.abstract | The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting usersee information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patientsee medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international expertsee panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems. ; | en_US |
dc.description.statementofresponsibility | edited by Nilanjan Dey, Rosalina Babo, Amira S. Ashour, Vishal Bhatnagar, Med Salim Bouhlel. | en_US |
dc.format.extent | XII, 171 p. 31 illus., 25 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319900582.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Knowledge management. ; | en_US |
dc.subject | Emergency medicine. ; | en_US |
dc.subject | Special Purpose Computers | en_US |
dc.subject | User interfaces and Computer Systems | en_US |
dc.subject | Application Software | en_US |
dc.subject | Computer Science | en_US |
dc.subject | User Interfaces and Human Computer Interaction | en_US |
dc.subject | Computer Appl. in Social and Behavioral Sciences. ; | en_US |
dc.subject | Knowledge Management. ; | en_US |
dc.subject | Emergency Services. ; | en_US |
dc.subject | Special Purpose and Application-Based Systems. ; | en_US |
dc.title | Social Networks Science: Design, Implementation, Security, and Challenges | en_US |
dc.title.alternative | From Social Networks Analysis to Social Networks Intelligence / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319900582.pdf | 3.95 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dey, Nilanjan. ; | en_US |
dc.contributor.author | Babo, Rosalina. ; | en_US |
dc.contributor.author | Ashour, Amira S. ; | en_US |
dc.contributor.author | Bhatnagar, Vishal. ; | en_US |
dc.contributor.author | Bouhlel, Med Salim. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:48Z | - |
dc.date.available | 2020-05-17T08:24:48Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319900599 ; | en_US |
dc.identifier.isbn | 9783319900582 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1073 | - |
dc.description | 005.437 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319900582. ; | en_US |
dc.description | QA76.9.H85 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | 4.019 ; 23 ; | en_US |
dc.description.abstract | The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting usersee information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patientsee medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international expertsee panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems. ; | en_US |
dc.description.statementofresponsibility | edited by Nilanjan Dey, Rosalina Babo, Amira S. Ashour, Vishal Bhatnagar, Med Salim Bouhlel. | en_US |
dc.format.extent | XII, 171 p. 31 illus., 25 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319900582.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Knowledge management. ; | en_US |
dc.subject | Emergency medicine. ; | en_US |
dc.subject | Special Purpose Computers | en_US |
dc.subject | User interfaces and Computer Systems | en_US |
dc.subject | Application Software | en_US |
dc.subject | Computer Science | en_US |
dc.subject | User Interfaces and Human Computer Interaction | en_US |
dc.subject | Computer Appl. in Social and Behavioral Sciences. ; | en_US |
dc.subject | Knowledge Management. ; | en_US |
dc.subject | Emergency Services. ; | en_US |
dc.subject | Special Purpose and Application-Based Systems. ; | en_US |
dc.title | Social Networks Science: Design, Implementation, Security, and Challenges | en_US |
dc.title.alternative | From Social Networks Analysis to Social Networks Intelligence / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319900582.pdf | 3.95 MB | Adobe PDF | Preview File |