| 000 | 06856cam a2200925 a 4500 | ||
|---|---|---|---|
| 001 | ocn190760120 | ||
| 003 | OCoLC | ||
| 005 | 20240829154106.0 | ||
| 006 | m d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 080111s2008 ne a ob 001 0 eng d | ||
| 010 | _z 2007033726 | ||
| 040 |
_aN$T _beng _epn _cN$T _dYDXCP _dOCLCQ _dIDEBK _dE7B _dOCLCQ _dDKDLA _dOCLCQ _dCOO _dOCLCO _dOCLCQ _dOCLCF _dOCLCQ _dOPELS _dB24X7 _dVLB _dOCLCQ _dAZK _dJBG _dCOCUF _dAGLDB _dSTF _dMOR _dPIFAG _dZCU _dOTZ _dLIV _dOCLCQ _dOCLCA _dNLE _dWRM _dD6H _dVTS _dNRAMU _dVT2 _dOCLCQ _dUKMGB _dLEAUB _dAU@ _dM8D _dOCLCQ _dVLY _dBRF _dUKCRE _dOCLCQ _dOCLCO _dMHW _dOCLCO _dOCLCQ _dOCLCO _dOCLCQ _dINARC _dOCLCO _dOCLCL _dEZC |
||
| 015 |
_aGBB6H5404 _2bnb |
||
| 016 | 7 |
_a017585178 _2Uk |
|
| 019 |
_a228148418 _a473204748 _a647692047 _a961595880 _a962700702 _a984786104 _a988441715 _a991961986 _a995040134 _a1034977534 _a1037793297 _a1038674304 _a1045455063 _a1055378383 _a1081286609 _a1103267677 _a1129355989 _a1152985238 _a1161999502 _a1192342023 _a1228545597 _a1391569258 |
||
| 020 |
_a9780080555881 _q(electronic bk.) |
||
| 020 |
_a0080555888 _q(electronic bk.) |
||
| 020 | _a1281096172 | ||
| 020 | _a9781281096173 | ||
| 020 | _a9786611096175 | ||
| 020 | _a6611096175 | ||
| 020 |
_z9780123735669 _q(pbk. ; _qalk. paper) |
||
| 020 |
_z0123735661 _q(pbk. ; _qalk. paper) |
||
| 035 |
_a214765 _b(N$T) |
||
| 035 |
_a(OCoLC)190760120 _z(OCoLC)228148418 _z(OCoLC)473204748 _z(OCoLC)647692047 _z(OCoLC)961595880 _z(OCoLC)962700702 _z(OCoLC)984786104 _z(OCoLC)988441715 _z(OCoLC)991961986 _z(OCoLC)995040134 _z(OCoLC)1034977534 _z(OCoLC)1037793297 _z(OCoLC)1038674304 _z(OCoLC)1045455063 _z(OCoLC)1055378383 _z(OCoLC)1081286609 _z(OCoLC)1103267677 _z(OCoLC)1129355989 _z(OCoLC)1152985238 _z(OCoLC)1161999502 _z(OCoLC)1192342023 _z(OCoLC)1228545597 _z(OCoLC)1391569258 |
||
| 037 |
_a134565:134696 _bElsevier Science & Technology _nhttp://www.sciencedirect.com |
||
| 050 | 4 |
_aTK5105.59 _b.I5247 2008eb |
|
| 072 | 7 |
_aCOM _x060040 _2bisacsh |
|
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _222 |
| 049 | _aMAIN | ||
| 245 | 0 | 0 |
_aInformation assurance : _bdependability and security in networked systems / _c[edited by] Yi Qian [and others]. |
| 260 |
_aAmsterdam ; _aBoston : _bElsevier/Morgan Kaufmann, _c©2008. |
||
| 300 |
_a1 online resource (xxxvii, 537 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 1 | _aThe Morgan Kaufmann series in networking | |
| 490 | 1 | _aThe Morgan Kaufmann series in computer security | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aPART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. | |
| 520 | 8 | _aIn todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks. | |
| 520 | 8 | _aPrintbegrænsninger: Der kan printes kapitelvis. | |
| 588 | 0 | _aPrint version record. | |
| 546 | _aEnglish. | ||
| 590 | _aAdded to collection customer.56279.3 | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aComputer networks _xReliability. _916931 |
|
| 650 | 0 |
_aComputer security. _92191 |
|
| 650 | 6 |
_aRéseaux d'ordinateurs _xSécurité _xMesures. _920700 |
|
| 650 | 6 |
_aRéseaux d'ordinateurs _xFiabilité. _929324 |
|
| 650 | 6 |
_aSécurité informatique. _918600 |
|
| 650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
| 650 | 7 |
_aComputer networks _xSecurity measures. _2blmlsh |
|
| 650 | 7 |
_aComputer networks _xReliability. _2blmlsh _916931 |
|
| 650 | 7 |
_aComputer security. _2blmlsh _92191 |
|
| 650 | 7 |
_aComputer networks _xReliability _2fast _916931 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
| 650 | 7 |
_aComputer security _2fast _92191 |
|
| 655 | 7 |
_adissertations. _2aat _9973377 |
|
| 655 | 7 |
_aAcademic theses _2fast _912626 |
|
| 655 | 7 |
_aAcademic theses. _2lcgft _912626 |
|
| 655 | 7 |
_aThèses et écrits académiques. _2rvmgf _9967013 |
|
| 700 | 1 |
_aQian, Yi, _d1962- _9117213 |
|
| 758 |
_ihas work: _aInformation assurance (Text) _1https://id.oclc.org/worldcat/entity/E39PCGW4xFKWXvdY9RgD6rYJcK _4https://id.oclc.org/worldcat/ontology/hasWork |
||
| 776 | 0 | 8 |
_iPrint version: _tInformation assurance. _dAmsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008 _z9780123735669 _z0123735661 _w(DLC) 2007033726 _w(OCoLC)166290628 |
| 830 | 0 |
_aMorgan Kaufmann series in networking. _996667 |
|
| 830 | 0 | _aMorgan Kaufmann series in computer security. | |
| 856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765 |
| 938 |
_aBooks 24x7 _bB247 _nbks00037350 |
||
| 938 |
_aebrary _bEBRY _nebr10204358 |
||
| 938 |
_aEBSCOhost _bEBSC _n214765 |
||
| 938 |
_aYBP Library Services _bYANK _n2754827 |
||
| 938 |
_aInternet Archive _bINAR _ninformationassur0000unse |
||
| 994 |
_a92 _bN$T |
||
| 999 |
_c684655 _d684655 |
||