Cargando…

Information assurance : dependability and security in networked systems /

In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electro...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Qian, Yi, 1962-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008.
Colección:Morgan Kaufmann series in networking.
Morgan Kaufmann series in computer security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn190760120
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 080111s2008 ne a ob 001 0 eng d
010 |z  2007033726 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d IDEBK  |d E7B  |d OCLCQ  |d DKDLA  |d OCLCQ  |d COO  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OPELS  |d B24X7  |d VLB  |d OCLCQ  |d AZK  |d JBG  |d COCUF  |d AGLDB  |d STF  |d MOR  |d PIFAG  |d ZCU  |d OTZ  |d LIV  |d OCLCQ  |d OCLCA  |d NLE  |d WRM  |d D6H  |d VTS  |d NRAMU  |d VT2  |d OCLCQ  |d UKMGB  |d LEAUB  |d AU@  |d M8D  |d OCLCQ  |d VLY  |d BRF  |d UKCRE  |d OCLCQ  |d OCLCO  |d MHW  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d INARC 
015 |a GBB6H5404  |2 bnb 
016 7 |a 017585178  |2 Uk 
019 |a 228148418  |a 473204748  |a 647692047  |a 961595880  |a 962700702  |a 984786104  |a 988441715  |a 991961986  |a 995040134  |a 1037793297  |a 1038674304  |a 1045455063  |a 1055378383  |a 1081286609  |a 1103267677  |a 1129355989  |a 1152985238  |a 1161999502  |a 1192342023  |a 1228545597  |a 1391569258 
020 |a 9780080555881  |q (electronic bk.) 
020 |a 0080555888  |q (electronic bk.) 
020 |a 1281096172 
020 |a 9781281096173 
020 |a 9786611096175 
020 |a 6611096175 
020 |z 9780123735669  |q (pbk. ;  |q alk. paper) 
020 |z 0123735661  |q (pbk. ;  |q alk. paper) 
029 1 |a AU@  |b 000043178412 
029 1 |a AU@  |b 000051562616 
029 1 |a CHNEW  |b 001007376 
029 1 |a DEBBG  |b BV039829430 
029 1 |a DEBBG  |b BV042305715 
029 1 |a DEBBG  |b BV043095540 
029 1 |a DEBSZ  |b 405318782 
029 1 |a DEBSZ  |b 422157082 
029 1 |a GBVCP  |b 802413390 
029 1 |a NZ1  |b 12479010 
029 1 |a NZ1  |b 14540495 
029 1 |a NZ1  |b 15189658 
029 1 |a UKMGB  |b 017585178 
035 |a (OCoLC)190760120  |z (OCoLC)228148418  |z (OCoLC)473204748  |z (OCoLC)647692047  |z (OCoLC)961595880  |z (OCoLC)962700702  |z (OCoLC)984786104  |z (OCoLC)988441715  |z (OCoLC)991961986  |z (OCoLC)995040134  |z (OCoLC)1037793297  |z (OCoLC)1038674304  |z (OCoLC)1045455063  |z (OCoLC)1055378383  |z (OCoLC)1081286609  |z (OCoLC)1103267677  |z (OCoLC)1129355989  |z (OCoLC)1152985238  |z (OCoLC)1161999502  |z (OCoLC)1192342023  |z (OCoLC)1228545597  |z (OCoLC)1391569258 
037 |a 134565:134696  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .I5247 2008eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Information assurance :  |b dependability and security in networked systems /  |c [edited by] Yi Qian [and others]. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier/Morgan Kaufmann,  |c ©2008. 
300 |a 1 online resource (xxxvii, 537 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The Morgan Kaufmann series in networking 
490 1 |a The Morgan Kaufmann series in computer security 
504 |a Includes bibliographical references and index. 
505 0 |a PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. 
520 8 |a In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks. 
520 8 |a Printbegrænsninger: Der kan printes kapitelvis. 
588 0 |a Print version record. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Reliability. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Fiabilité. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer networks  |x Reliability.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer networks  |x Reliability.  |2 fast  |0 (OCoLC)fst00872335 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Qian, Yi,  |d 1962- 
776 0 8 |i Print version:  |t Information assurance.  |d Amsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008  |z 9780123735669  |z 0123735661  |w (DLC) 2007033726  |w (OCoLC)166290628 
830 0 |a Morgan Kaufmann series in networking. 
830 0 |a Morgan Kaufmann series in computer security. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214765  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00037350 
938 |a ebrary  |b EBRY  |n ebr10204358 
938 |a EBSCOhost  |b EBSC  |n 214765 
938 |a YBP Library Services  |b YANK  |n 2754827 
938 |a Internet Archive  |b INAR  |n informationassur0000unse 
994 |a 92  |b IZTAP