|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn228170469 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
070228s2006 ne a ob 101 0 eng d |
010 |
|
|
|z 2006935041
|
040 |
|
|
|a Nz
|b eng
|e pn
|c UV0
|d OCLCQ
|d N$T
|d HVC
|d EBLCP
|d YDXCP
|d IOSPR
|d IDEBK
|d OCLCE
|d E7B
|d OCLCQ
|d MHW
|d OCLCQ
|d CCO
|d DKDLA
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCF
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d AZK
|d JBG
|d OCLCQ
|d AGLDB
|d MOR
|d PIFBR
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d BRL
|d STF
|d WRM
|d OCLCQ
|d VTS
|d EZ9
|d ICG
|d INT
|d VT2
|d OCLCQ
|d WYU
|d A6Q
|d OCLCQ
|d DKC
|d OCLCQ
|d UKCRE
|d AJS
|d OCLCQ
|d OCLCO
|d M8D
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 127124228
|a 138054898
|a 154792117
|a 228170470
|a 473750069
|a 482606289
|a 491253566
|a 567996969
|a 608168787
|a 608168790
|a 609322997
|a 722546187
|a 728033460
|a 744981623
|a 814477755
|a 961573151
|a 962609697
|a 974201062
|a 980253678
|a 981380541
|a 988512154
|a 991584946
|a 992114616
|a 1005638764
|a 1018050037
|a 1037455151
|a 1038659117
|a 1042326512
|a 1047529992
|a 1049146650
|a 1055255634
|a 1055339552
|a 1066598882
|a 1076307286
|a 1081270669
|a 1153509066
|a 1228601570
|a 1330353013
|
020 |
|
|
|a 9781429467643
|q (electronic bk.)
|
020 |
|
|
|a 1429467649
|q (electronic bk.)
|
020 |
|
|
|a 1433701529
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 9781433701528
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 9781607502098
|
020 |
|
|
|a 1607502097
|
020 |
|
|
|z 1586036785
|
020 |
|
|
|z 9781586036782
|
029 |
0 |
|
|a NZ1
|b 12061604
|
029 |
1 |
|
|a AU@
|b 000046686887
|
029 |
1 |
|
|a AU@
|b 000048750820
|
029 |
1 |
|
|a AU@
|b 000051373081
|
029 |
1 |
|
|a DEBBG
|b BV043101234
|
029 |
1 |
|
|a DEBBG
|b BV044122930
|
029 |
1 |
|
|a DEBSZ
|b 422216674
|
029 |
1 |
|
|a DEBSZ
|b 430377746
|
035 |
|
|
|a (OCoLC)228170469
|z (OCoLC)127124228
|z (OCoLC)138054898
|z (OCoLC)154792117
|z (OCoLC)228170470
|z (OCoLC)473750069
|z (OCoLC)482606289
|z (OCoLC)491253566
|z (OCoLC)567996969
|z (OCoLC)608168787
|z (OCoLC)608168790
|z (OCoLC)609322997
|z (OCoLC)722546187
|z (OCoLC)728033460
|z (OCoLC)744981623
|z (OCoLC)814477755
|z (OCoLC)961573151
|z (OCoLC)962609697
|z (OCoLC)974201062
|z (OCoLC)980253678
|z (OCoLC)981380541
|z (OCoLC)988512154
|z (OCoLC)991584946
|z (OCoLC)992114616
|z (OCoLC)1005638764
|z (OCoLC)1018050037
|z (OCoLC)1037455151
|z (OCoLC)1038659117
|z (OCoLC)1042326512
|z (OCoLC)1047529992
|z (OCoLC)1049146650
|z (OCoLC)1055255634
|z (OCoLC)1055339552
|z (OCoLC)1066598882
|z (OCoLC)1076307286
|z (OCoLC)1081270669
|z (OCoLC)1153509066
|z (OCoLC)1228601570
|z (OCoLC)1330353013
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b N3753 2006eb
|
072 |
|
7 |
|a COM
|x COM014000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
111 |
2 |
|
|a NATO Advanced Research Workshop on Information Assurance and Computer Security
|d (2005 :
|c Tétouan, Morocco)
|
245 |
1 |
0 |
|a Information assurance and computer security /
|c edited by Johnson P. Thomas and Mohamed Essaaidi.
|
260 |
|
|
|a Amsterdam ;
|a Washington, DC :
|b IOS Press,
|c ©2006.
|
300 |
|
|
|a 1 online resource (viii, 205 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a NATO security through science series. D, Information and communication security ;
|v v. 6
|
500 |
|
|
|a "Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--Title page verso
|
504 |
|
|
|a Includes bibliographical references and author index.
|
505 |
0 |
|
|a Title page; Preface; Contents; Theory; Tools; Architecture; Applications; Author Index.
|
520 |
|
|
|a Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Thomas, Johnson P.
|
700 |
1 |
|
|a Essaaidi, Mohamed.
|
758 |
|
|
|i has work:
|a Information assurance and computer security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PD3Bc3C6kwTkVHpbctTbY8C
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : Tétouan, Morocco).
|t Information assurance and computer security.
|d Amsterdam ; Washington, DC : IOS Press, ©2006
|w (DLC) 2006935041
|
830 |
|
0 |
|a NATO security through science series.
|n D,
|p Information and communication security ;
|v v. 6.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=287000
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL287000
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 187946
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2625005
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2559873
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3207225
|
938 |
|
|
|a Internet Archive
|b INAR
|n informationassur0000nato
|
994 |
|
|
|a 92
|b IZTAP
|