|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn868964494 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
140124s2014 njua ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d EBLCP
|d E7B
|d OCLCQ
|d DEBSZ
|d N$T
|d OCLCF
|d OCLCQ
|d YDXCP
|d RECBK
|d DEBBG
|d OCLCQ
|d AZK
|d CNNLC
|d COCUF
|d S4S
|d CNNOR
|d MOR
|d CCO
|d PIFBY
|d ZCU
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d STF
|d OCLCQ
|d ICG
|d INT
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d G3B
|d TKN
|d OCLCQ
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 961590850
|a 962707583
|
020 |
|
|
|a 9781306373593
|q (electronic bk.)
|
020 |
|
|
|a 130637359X
|q (electronic bk.)
|
020 |
|
|
|a 9781118651704
|q (electronic bk.)
|
020 |
|
|
|a 1118651707
|q (electronic bk.)
|
020 |
|
|
|z 9781118651971
|
029 |
1 |
|
|a AU@
|b 000062514690
|
029 |
1 |
|
|a AU@
|b 000066758919
|
029 |
1 |
|
|a DEBBG
|b BV043607170
|
029 |
1 |
|
|a DEBSZ
|b 405573464
|
035 |
|
|
|a (OCoLC)868964494
|z (OCoLC)961590850
|z (OCoLC)962707583
|
050 |
|
4 |
|a QA76.9.A25
|b .V384 2014eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Voeller, John G.
|
245 |
1 |
0 |
|a Communications and information infrastructure security /
|c edited by John G. Voeller.
|
260 |
|
|
|a Hoboken, N.J. :
|b Wiley,
|c ©2014.
|
300 |
|
|
|a 1 online resource :
|b illustrations (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Title Page; Copyright; Preface; 1 Telecommunication: Critical Infrastructure Protection; 1.1 Introduction; 1.2 Overview; 1.3 Evolutionary Forces That Shape the Sector; 1.4 Major Components of the Sector; 1.5 Resiliency of Networks; 1.6 Resilience Results; 1.7 Telecommunications Criticality; 1.8 Final Analysis; References; Further Reading; 2 Strategies for Protecting the Telecommunications Sector; 2.1 Introduction; 2.2 Background; 2.3 Threats, Challenges, and Continuous Improvement; 2.4 Telecommunications Challenges and Continuous Improvement; 2.5 Conclusions; References; Further Reading.
|
505 |
8 |
|
|a 3 Wireless Security3.1 Scientific Overview; 3.2 Mobile and Wireless Security Landscape; 3.3 Critical Needs Analysis; 3.4 Research Directions; References; Further Reading; 4 Detection of Hidden Information, Covert Channels and Information Flows; 4.1 Introduction; 4.2 Scientific Overview; 4.3 Countermeasures; 4.4 Research and Development Trends; 4.5 Critical Needs Analysis; 4.6 Research Directions; References; Further Reading; Other Suggested Reading; 5 Inherently Secure Next-Generation Computing and Communication Networks for Reducing Cascading Impacts; 5.1 Introduction.
|
505 |
8 |
|
|a 5.2 Standards, Guidelines, and Best Practices5.3 Standards; 5.4 Best Practice; 5.5 Measure and Assess Security Posture; 5.6 Cyber Security Threats and Vulnerabilities; 5.7 Cascading Failure; 5.8 Legacy Systems; 5.9 Intrusion Detection and Response Technology; 5.10 Research Direction; References; Further Reading; 6 The Sensor Web: Advanced Technology for Situational Awareness; 6.1 Introduction; 6.2 Sensor Web Technology; 6.3 Sensor Webs Applied to Field Operations; 6.4 Future Directions; References; 7 Consequence Mitigation: Current Research and Future Trends; 7.1 Introduction.
|
505 |
8 |
|
|a 7.2 Scientific Overview7.3 Active Research and Funding; 7.4 Critical Needs Analysis; 7.5 Research Directions; References; Further Reading; Index.
|
520 |
|
|
|a Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
758 |
|
|
|i has work:
|a Communications and information infrastructure security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCG9MV446VCPjkjJ3kc3PcP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Erscheint auch als:
|n Druck-Ausgabe
|t Voeller, John G. Communications and Information Infrastructure Security
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1598810
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0022617478
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26129982
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4037259
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1598810
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10829813
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 688362
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis27386246
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00198427
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11597389
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12676714
|
994 |
|
|
|a 92
|b IZTAP
|