Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1073
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDey, Nilanjan. ;en_US
dc.contributor.authorBabo, Rosalina. ;en_US
dc.contributor.authorAshour, Amira S. ;en_US
dc.contributor.authorBhatnagar, Vishal. ;en_US
dc.contributor.authorBouhlel, Med Salim. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:48Z-
dc.date.available2020-05-17T08:24:48Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319900599 ;en_US
dc.identifier.isbn9783319900582 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1073-
dc.description005.437 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319900582. ;en_US
dc.descriptionQA76.9.H85 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description4.019 ; 23 ;en_US
dc.description.abstractThe main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting usersee information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patientsee medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international expertsee panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems. ;en_US
dc.description.statementofresponsibilityedited by Nilanjan Dey, Rosalina Babo, Amira S. Ashour, Vishal Bhatnagar, Med Salim Bouhlel.en_US
dc.format.extentXII, 171 p. 31 illus., 25 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319900582.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectKnowledge management. ;en_US
dc.subjectEmergency medicine. ;en_US
dc.subjectSpecial Purpose Computersen_US
dc.subjectUser interfaces and Computer Systemsen_US
dc.subjectApplication Softwareen_US
dc.subjectComputer Scienceen_US
dc.subjectUser Interfaces and Human Computer Interactionen_US
dc.subjectComputer Appl. in Social and Behavioral Sciences. ;en_US
dc.subjectKnowledge Management. ;en_US
dc.subjectEmergency Services. ;en_US
dc.subjectSpecial Purpose and Application-Based Systems. ;en_US
dc.titleSocial Networks Science: Design, Implementation, Security, and Challengesen_US
dc.title.alternativeFrom Social Networks Analysis to Social Networks Intelligence /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319900582.pdf3.95 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDey, Nilanjan. ;en_US
dc.contributor.authorBabo, Rosalina. ;en_US
dc.contributor.authorAshour, Amira S. ;en_US
dc.contributor.authorBhatnagar, Vishal. ;en_US
dc.contributor.authorBouhlel, Med Salim. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:48Z-
dc.date.available2020-05-17T08:24:48Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319900599 ;en_US
dc.identifier.isbn9783319900582 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1073-
dc.description005.437 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319900582. ;en_US
dc.descriptionQA76.9.H85 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description4.019 ; 23 ;en_US
dc.description.abstractThe main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting usersee information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patientsee medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international expertsee panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems. ;en_US
dc.description.statementofresponsibilityedited by Nilanjan Dey, Rosalina Babo, Amira S. Ashour, Vishal Bhatnagar, Med Salim Bouhlel.en_US
dc.format.extentXII, 171 p. 31 illus., 25 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319900582.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectKnowledge management. ;en_US
dc.subjectEmergency medicine. ;en_US
dc.subjectSpecial Purpose Computersen_US
dc.subjectUser interfaces and Computer Systemsen_US
dc.subjectApplication Softwareen_US
dc.subjectComputer Scienceen_US
dc.subjectUser Interfaces and Human Computer Interactionen_US
dc.subjectComputer Appl. in Social and Behavioral Sciences. ;en_US
dc.subjectKnowledge Management. ;en_US
dc.subjectEmergency Services. ;en_US
dc.subjectSpecial Purpose and Application-Based Systems. ;en_US
dc.titleSocial Networks Science: Design, Implementation, Security, and Challengesen_US
dc.title.alternativeFrom Social Networks Analysis to Social Networks Intelligence /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319900582.pdf3.95 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDey, Nilanjan. ;en_US
dc.contributor.authorBabo, Rosalina. ;en_US
dc.contributor.authorAshour, Amira S. ;en_US
dc.contributor.authorBhatnagar, Vishal. ;en_US
dc.contributor.authorBouhlel, Med Salim. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:48Z-
dc.date.available2020-05-17T08:24:48Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319900599 ;en_US
dc.identifier.isbn9783319900582 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1073-
dc.description005.437 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319900582. ;en_US
dc.descriptionQA76.9.H85 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description4.019 ; 23 ;en_US
dc.description.abstractThe main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting usersee information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patientsee medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international expertsee panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems. ;en_US
dc.description.statementofresponsibilityedited by Nilanjan Dey, Rosalina Babo, Amira S. Ashour, Vishal Bhatnagar, Med Salim Bouhlel.en_US
dc.format.extentXII, 171 p. 31 illus., 25 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319900582.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectKnowledge management. ;en_US
dc.subjectEmergency medicine. ;en_US
dc.subjectSpecial Purpose Computersen_US
dc.subjectUser interfaces and Computer Systemsen_US
dc.subjectApplication Softwareen_US
dc.subjectComputer Scienceen_US
dc.subjectUser Interfaces and Human Computer Interactionen_US
dc.subjectComputer Appl. in Social and Behavioral Sciences. ;en_US
dc.subjectKnowledge Management. ;en_US
dc.subjectEmergency Services. ;en_US
dc.subjectSpecial Purpose and Application-Based Systems. ;en_US
dc.titleSocial Networks Science: Design, Implementation, Security, and Challengesen_US
dc.title.alternativeFrom Social Networks Analysis to Social Networks Intelligence /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319900582.pdf3.95 MBAdobe PDFThumbnail
Preview File