Cargando…

Communications and information infrastructure security /

Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Voeller, John G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : Wiley, ©2014.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn868964494
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 140124s2014 njua ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d E7B  |d OCLCQ  |d DEBSZ  |d N$T  |d OCLCF  |d OCLCQ  |d YDXCP  |d RECBK  |d DEBBG  |d OCLCQ  |d AZK  |d CNNLC  |d COCUF  |d S4S  |d CNNOR  |d MOR  |d CCO  |d PIFBY  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d OCLCQ  |d ICG  |d INT  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 961590850  |a 962707583 
020 |a 9781306373593  |q (electronic bk.) 
020 |a 130637359X  |q (electronic bk.) 
020 |a 9781118651704  |q (electronic bk.) 
020 |a 1118651707  |q (electronic bk.) 
020 |z 9781118651971 
029 1 |a AU@  |b 000062514690 
029 1 |a AU@  |b 000066758919 
029 1 |a DEBBG  |b BV043607170 
029 1 |a DEBSZ  |b 405573464 
035 |a (OCoLC)868964494  |z (OCoLC)961590850  |z (OCoLC)962707583 
050 4 |a QA76.9.A25  |b .V384 2014eb 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Voeller, John G. 
245 1 0 |a Communications and information infrastructure security /  |c edited by John G. Voeller. 
260 |a Hoboken, N.J. :  |b Wiley,  |c ©2014. 
300 |a 1 online resource :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Title Page; Copyright; Preface; 1 Telecommunication: Critical Infrastructure Protection; 1.1 Introduction; 1.2 Overview; 1.3 Evolutionary Forces That Shape the Sector; 1.4 Major Components of the Sector; 1.5 Resiliency of Networks; 1.6 Resilience Results; 1.7 Telecommunications Criticality; 1.8 Final Analysis; References; Further Reading; 2 Strategies for Protecting the Telecommunications Sector; 2.1 Introduction; 2.2 Background; 2.3 Threats, Challenges, and Continuous Improvement; 2.4 Telecommunications Challenges and Continuous Improvement; 2.5 Conclusions; References; Further Reading. 
505 8 |a 3 Wireless Security3.1 Scientific Overview; 3.2 Mobile and Wireless Security Landscape; 3.3 Critical Needs Analysis; 3.4 Research Directions; References; Further Reading; 4 Detection of Hidden Information, Covert Channels and Information Flows; 4.1 Introduction; 4.2 Scientific Overview; 4.3 Countermeasures; 4.4 Research and Development Trends; 4.5 Critical Needs Analysis; 4.6 Research Directions; References; Further Reading; Other Suggested Reading; 5 Inherently Secure Next-Generation Computing and Communication Networks for Reducing Cascading Impacts; 5.1 Introduction. 
505 8 |a 5.2 Standards, Guidelines, and Best Practices5.3 Standards; 5.4 Best Practice; 5.5 Measure and Assess Security Posture; 5.6 Cyber Security Threats and Vulnerabilities; 5.7 Cascading Failure; 5.8 Legacy Systems; 5.9 Intrusion Detection and Response Technology; 5.10 Research Direction; References; Further Reading; 6 The Sensor Web: Advanced Technology for Situational Awareness; 6.1 Introduction; 6.2 Sensor Web Technology; 6.3 Sensor Webs Applied to Field Operations; 6.4 Future Directions; References; 7 Consequence Mitigation: Current Research and Future Trends; 7.1 Introduction. 
505 8 |a 7.2 Scientific Overview7.3 Active Research and Funding; 7.4 Critical Needs Analysis; 7.5 Research Directions; References; Further Reading; Index. 
520 |a Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Communications and information infrastructure security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG9MV446VCPjkjJ3kc3PcP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Erscheint auch als:  |n Druck-Ausgabe  |t Voeller, John G. Communications and Information Infrastructure Security 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1598810  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0022617478 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26129982 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4037259 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1598810 
938 |a ebrary  |b EBRY  |n ebr10829813 
938 |a EBSCOhost  |b EBSC  |n 688362 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis27386246 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00198427 
938 |a YBP Library Services  |b YANK  |n 11597389 
938 |a YBP Library Services  |b YANK  |n 12676714 
994 |a 92  |b IZTAP