|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_ocn861526594 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130916t20142014maua ob 001 0 eng d |
010 |
|
|
|z 2013388292
|
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d YDXCP
|d OCLCO
|d N$T
|d B24X7
|d COO
|d OCLCQ
|d OCLCF
|d ICA
|d DEBSZ
|d COCUF
|d AGLDB
|d K6U
|d CNNOR
|d CCO
|d Z5A
|d PIFAG
|d FVL
|d LIV
|d SAV
|d OCLCA
|d U3W
|d OCLCA
|d D6H
|d STF
|d OCLCQ
|d VTS
|d CEF
|d INT
|d S4S
|d CNSPO
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d GGVRL
|d G3B
|d TKN
|d OCLCQ
|d UAB
|d UK7LJ
|d UWK
|d OCLCQ
|d OCLCO
|d TUHNV
|d OCLCO
|d OCLCQ
|d INARC
|d QGK
|d OCLCO
|d OCLCQ
|d OCLCL
|
016 |
7 |
|
|a 016471911
|2 Uk
|
019 |
|
|
|a 867908977
|a 872699134
|a 879495415
|a 1055358267
|a 1065688233
|a 1081210002
|a 1103270335
|a 1129348997
|a 1152972366
|a 1156041772
|a 1166182927
|a 1192336141
|a 1228558254
|a 1259081812
|a 1393045772
|
020 |
|
|
|a 9780124200470
|q (electronic bk.)
|
020 |
|
|
|a 0124200478
|q (electronic bk.)
|
020 |
|
|
|z 9780124166813
|
020 |
|
|
|z 0124166814
|q (pbk.)
|
029 |
1 |
|
|a AU@
|b 000052305205
|
029 |
1 |
|
|a AU@
|b 000053308518
|
029 |
1 |
|
|a CHNEW
|b 000634483
|
029 |
1 |
|
|a CHVBK
|b 311575803
|
029 |
1 |
|
|a DEBBG
|b BV043957926
|
029 |
1 |
|
|a DEBSZ
|b 481276378
|
029 |
1 |
|
|a NZ1
|b 15550105
|
029 |
1 |
|
|a NZ1
|b 15962790
|
029 |
1 |
|
|a AU@
|b 000053745400
|
035 |
|
|
|a (OCoLC)861526594
|z (OCoLC)867908977
|z (OCoLC)872699134
|z (OCoLC)879495415
|z (OCoLC)1055358267
|z (OCoLC)1065688233
|z (OCoLC)1081210002
|z (OCoLC)1103270335
|z (OCoLC)1129348997
|z (OCoLC)1152972366
|z (OCoLC)1156041772
|z (OCoLC)1166182927
|z (OCoLC)1192336141
|z (OCoLC)1228558254
|z (OCoLC)1259081812
|z (OCoLC)1393045772
|
037 |
|
|
|b Title purchased via Dawsonera PDA
|
050 |
|
4 |
|a QA76.9.A25
|b C93 2014eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cyber security and IT infrastructure protection /
|c edited by John R. Vacca.
|
264 |
|
1 |
|a Waltham, MA :
|b Syngress,
|c [2014]
|
264 |
|
4 |
|c ©2014
|
300 |
|
|
|a 1 online resource (381 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed September 16, 2013).
|
505 |
0 |
0 |
|g 1.
|t Fault Tolerance and Resilience in Cloud Computing Environments /
|r Vincenzo Piuri --
|g 1.
|t Introduction --
|g 2.
|t Cloud Computing Fault Model --
|g 3.
|t Basic Concepts on Fault Tolerance --
|g 4.
|t Different Levels of Fault Tolerance in Cloud Computing --
|g 5.
|t Fault Tolerance against Crash Failures in Cloud Computing --
|g 6.
|t Fault Tolerance against Byzantine Failures in Cloud Computing --
|g 7.
|t Fault Tolerance as a Service in Cloud Computing --
|g 8.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|t Acknowledgments --
|t References --
|g 2.
|t Data Encryption /
|r Dr. Pramod Pandya --
|g 1.
|t Need for Cryptography --
|g 2.
|t Mathematical Prelude to Cryptography --
|g 3.
|t Classical Cryptography --
|g 4.
|t Modern Symmetric Ciphers --
|g 5.
|t Algebraic Structure --
|g 6.
|t The Internal Functions of Rijndael in AES Implementation --
|g 7.
|t Use of Modern Block Ciphers --
|g 8.
|t Public-Key Cryptography --
|g 9.
|t Cryptanalysis of RSA --
|g 10.
|t Diffie-Hellman Algorithm --
|g 11.
|t Elliptic Curve Cryptosystems --
|g 12.
|t Message Integrity and Authentication --
|g 13.
|t Triple Data Encryption Algorithm (TDEA) Block Cipher --
|g 14.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|t References --
|g 3.
|t Public Key Infrastructure /
|r Terence Spies --
|g 1.
|t Cryptographic Background --
|g 2.
|t Overview of PKI --
|g 3.
|t The X.509 Model --
|g 4.
|t X.509 Implementation Architectures --
|g 5.
|t X.509 Certificate Validation --
|g 6.
|t X.509 Certificate Revocation --
|g 7.
|t Server-Based Certificate Validity Protocol --
|g 8.
|t X.509 Bridge Certification Systems --
|g 9.
|t X.509 Certificate Format --
|g 10.
|t PKI Policy Description --
|g 11.
|t PKI Standards Organizations --
|g 12.
|t PGP Certificate Formats --
|g 13.
|t PGP PKI Implementations --
|g 14.
|t W3C --
|g 15.
|t Is PKI Secure? --
|g 16.
|t Alternative PKI Architectures --
|g 17.
|t Modified X.509 Architectures --
|g 18.
|t Alternative Key Management Models --
|g 19.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|t References --
|g 4.
|t Physical Security Essentials /
|r William Stallings --
|g 1.
|t Overview --
|g 2.
|t Physical Security Threats --
|g 3.
|t Physical Security Prevention and Mitigation Measures --
|g 4.
|t Recovery from Physical Security Breaches --
|g 5.
|t Threat Assessment, Planning, and Plan Implementation --
|g 6.
|t Example: A Corporate Physical Security Policy --
|g 7.
|t Integration of Physical and Logical Security --
|g 8.
|t Physical Security Checklist --
|g 9.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 5.
|t Disaster Recovery /
|r Lauren Collins --
|g 1.
|t Introduction --
|g 2.
|t Measuring Risk and Avoiding Disaster --
|g 3.
|t The Business Impact Assessment (BIA) --
|g 4.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 6.
|t Biometrics /
|r Luther Martin --
|g 1.
|t Relevant Standards --
|g 2.
|t Biometric System Architecture --
|g 3.
|t Using Biometric Systems --
|g 4.
|t Security Considerations --
|g 5.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 7.
|t Homeland Security /
|r Bhushan Kapoor --
|g 1.
|t Statutory Authorities --
|g 2.
|t Homeland Security Presidential Directives --
|g 3.
|t Organizational Actions --
|g 4.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 8.
|t Cyber Warfare /
|r Marco Slaviero --
|g 1.
|t Cyber Warfare Model --
|g 2.
|t Cyber Warfare Defined --
|g 3.
|t CW: Myth or Reality? --
|g 4.
|t Cyber Warfare: Making CW Possible --
|g 5.
|t Legal Aspects of CW --
|g 6.
|t Holistic View of Cyber Warfare --
|g 7.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 9.
|t System Security /
|r Lauren Collins --
|g 1.
|t Foundations of Security --
|g 2.
|t Basic Countermeasures --
|g 3.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 10.
|t Securing the Infrastructure /
|r Lauren Collins --
|g 1.
|t Communication Security Goals --
|g 2.
|t Attacks and Countermeasures --
|g 3.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 11.
|t Access Controls /
|r Lauren Collins --
|g 1.
|t Infrastructure Weaknesses: DAC, MAC, and RBAC --
|g 2.
|t Strengthening the Infrastructure: Authentication Systems --
|g 3.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 12.
|t Assessments and Audits /
|r Lauren Collins --
|g 1.
|t Assessing Vulnerabilities and Risk: Penetration Testing and Vulnerability Assessments --
|g 2.
|t Risk Management: Quantitative Risk Measurements --
|g 3.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 13.
|t Fundamentals of Cryptography /
|r Scott R. Ellis --
|g 1.
|t Assuring Privacy with Encryption --
|g 2.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|g 14.
|t Satellite Cyber Attack Search and Destroy /
|r Jeffrey Bardin --
|g 1.
|t Hacks, Interference, and Jamming --
|g 2.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise --
|t References --
|g 15.
|t Advanced Data Encryption /
|r Pramod Pandya --
|g 1.
|t Mathematical Concepts Reviewed --
|g 2.
|t The RSA Cryptosystem --
|g 3.
|t Summary --
|t Chapter Review Questions/Exercises --
|t Exercise.
|
520 |
|
|
|a "Part 1 Performance Analysis and Coaching 1 The role of performance analysis in elite netball competition structures 2 Soccer match analysis. A qualitative study with Portuguese First League coaches 3 Coach behaviour analysis within elite youth soccer 4 Performance analysis in professional soccer: Player and coach perspectives 5 Behaviour of academy soccer coaches during training sessions Part 2 Soccer This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: " Checklists throughout each chapter to gauge understanding " Chapter Review Questions/Exercises and Case Studies " Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc"--EBL
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention
|2 fast
|
700 |
1 |
|
|a Vacca, John R.,
|e editor.
|
758 |
|
|
|i has work:
|a Cyber security and IT infrastructure protection (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFr8kYGpKXtK3FqXQFXkMq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Cyber security and IT infrastructure protection.
|d Waltham, MA : Syngress, [2014]
|w (DLC) 2013388292
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1377640
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00058870
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10754065
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 635568
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8DFH
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11119727
|
938 |
|
|
|a Internet Archive
|b INAR
|n isbn_9780124166813
|
994 |
|
|
|a 92
|b IZTAP
|