000 06856cam a2200925 a 4500
001 ocn190760120
003 OCoLC
005 20240829154106.0
006 m d
007 cr cnu---unuuu
008 080111s2008 ne a ob 001 0 eng d
010 _z 2007033726
040 _aN$T
_beng
_epn
_cN$T
_dYDXCP
_dOCLCQ
_dIDEBK
_dE7B
_dOCLCQ
_dDKDLA
_dOCLCQ
_dCOO
_dOCLCO
_dOCLCQ
_dOCLCF
_dOCLCQ
_dOPELS
_dB24X7
_dVLB
_dOCLCQ
_dAZK
_dJBG
_dCOCUF
_dAGLDB
_dSTF
_dMOR
_dPIFAG
_dZCU
_dOTZ
_dLIV
_dOCLCQ
_dOCLCA
_dNLE
_dWRM
_dD6H
_dVTS
_dNRAMU
_dVT2
_dOCLCQ
_dUKMGB
_dLEAUB
_dAU@
_dM8D
_dOCLCQ
_dVLY
_dBRF
_dUKCRE
_dOCLCQ
_dOCLCO
_dMHW
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCQ
_dINARC
_dOCLCO
_dOCLCL
_dEZC
015 _aGBB6H5404
_2bnb
016 7 _a017585178
_2Uk
019 _a228148418
_a473204748
_a647692047
_a961595880
_a962700702
_a984786104
_a988441715
_a991961986
_a995040134
_a1034977534
_a1037793297
_a1038674304
_a1045455063
_a1055378383
_a1081286609
_a1103267677
_a1129355989
_a1152985238
_a1161999502
_a1192342023
_a1228545597
_a1391569258
020 _a9780080555881
_q(electronic bk.)
020 _a0080555888
_q(electronic bk.)
020 _a1281096172
020 _a9781281096173
020 _a9786611096175
020 _a6611096175
020 _z9780123735669
_q(pbk. ;
_qalk. paper)
020 _z0123735661
_q(pbk. ;
_qalk. paper)
035 _a214765
_b(N$T)
035 _a(OCoLC)190760120
_z(OCoLC)228148418
_z(OCoLC)473204748
_z(OCoLC)647692047
_z(OCoLC)961595880
_z(OCoLC)962700702
_z(OCoLC)984786104
_z(OCoLC)988441715
_z(OCoLC)991961986
_z(OCoLC)995040134
_z(OCoLC)1034977534
_z(OCoLC)1037793297
_z(OCoLC)1038674304
_z(OCoLC)1045455063
_z(OCoLC)1055378383
_z(OCoLC)1081286609
_z(OCoLC)1103267677
_z(OCoLC)1129355989
_z(OCoLC)1152985238
_z(OCoLC)1161999502
_z(OCoLC)1192342023
_z(OCoLC)1228545597
_z(OCoLC)1391569258
037 _a134565:134696
_bElsevier Science & Technology
_nhttp://www.sciencedirect.com
050 4 _aTK5105.59
_b.I5247 2008eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_222
049 _aMAIN
245 0 0 _aInformation assurance :
_bdependability and security in networked systems /
_c[edited by] Yi Qian [and others].
260 _aAmsterdam ;
_aBoston :
_bElsevier/Morgan Kaufmann,
_c©2008.
300 _a1 online resource (xxxvii, 537 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aThe Morgan Kaufmann series in networking
490 1 _aThe Morgan Kaufmann series in computer security
504 _aIncludes bibliographical references and index.
505 0 _aPART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I.
520 8 _aIn todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks.
520 8 _aPrintbegrænsninger: Der kan printes kapitelvis.
588 0 _aPrint version record.
546 _aEnglish.
590 _aAdded to collection customer.56279.3
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer networks
_xReliability.
_916931
650 0 _aComputer security.
_92191
650 6 _aRéseaux d'ordinateurs
_xSécurité
_xMesures.
_920700
650 6 _aRéseaux d'ordinateurs
_xFiabilité.
_929324
650 6 _aSécurité informatique.
_918600
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2blmlsh
650 7 _aComputer networks
_xReliability.
_2blmlsh
_916931
650 7 _aComputer security.
_2blmlsh
_92191
650 7 _aComputer networks
_xReliability
_2fast
_916931
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
_92191
655 7 _adissertations.
_2aat
_9973377
655 7 _aAcademic theses
_2fast
_912626
655 7 _aAcademic theses.
_2lcgft
_912626
655 7 _aThèses et écrits académiques.
_2rvmgf
_9967013
700 1 _aQian, Yi,
_d1962-
_9117213
758 _ihas work:
_aInformation assurance (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGW4xFKWXvdY9RgD6rYJcK
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tInformation assurance.
_dAmsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008
_z9780123735669
_z0123735661
_w(DLC) 2007033726
_w(OCoLC)166290628
830 0 _aMorgan Kaufmann series in networking.
_996667
830 0 _aMorgan Kaufmann series in computer security.
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765
938 _aBooks 24x7
_bB247
_nbks00037350
938 _aebrary
_bEBRY
_nebr10204358
938 _aEBSCOhost
_bEBSC
_n214765
938 _aYBP Library Services
_bYANK
_n2754827
938 _aInternet Archive
_bINAR
_ninformationassur0000unse
994 _a92
_bN$T
999 _c684655
_d684655