Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Contains academic and professional contributions on IT Convergence and Security
Covers the multidisciplinary field of IT Convergence and Security
Written by an international team of contributors
As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.
Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:
1. Introduction of the most recent information technology and its related ideas
2. Applications and problems related to technology convergence, and its case studies
3. Introduction of converging existing security techniques through convergence security
Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.
Content Level »Research
Keywords »Convergence Security - Convergence data mining - Data Mining - Green convergence services - IT Convergence - Information technology convergence - Information visualization - Mobile Computing - Multimedia - Security - Software Engineering