Information assurance : dependability and security in networked systems /
In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electro...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Elsevier/Morgan Kaufmann,
©2008.
|
Colección: | Morgan Kaufmann series in networking.
Morgan Kaufmann series in computer security. |
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBSCO_ocn190760120 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080111s2008 ne a ob 001 0 eng d | ||
010 | |z 2007033726 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d E7B |d OCLCQ |d DKDLA |d OCLCQ |d COO |d OCLCO |d OCLCQ |d OCLCF |d OCLCQ |d OPELS |d B24X7 |d VLB |d OCLCQ |d AZK |d JBG |d COCUF |d AGLDB |d STF |d MOR |d PIFAG |d ZCU |d OTZ |d LIV |d OCLCQ |d OCLCA |d NLE |d WRM |d D6H |d VTS |d NRAMU |d VT2 |d OCLCQ |d UKMGB |d LEAUB |d AU@ |d M8D |d OCLCQ |d VLY |d BRF |d UKCRE |d OCLCQ |d OCLCO |d MHW |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d INARC | ||
015 | |a GBB6H5404 |2 bnb | ||
016 | 7 | |a 017585178 |2 Uk | |
019 | |a 228148418 |a 473204748 |a 647692047 |a 961595880 |a 962700702 |a 984786104 |a 988441715 |a 991961986 |a 995040134 |a 1037793297 |a 1038674304 |a 1045455063 |a 1055378383 |a 1081286609 |a 1103267677 |a 1129355989 |a 1152985238 |a 1161999502 |a 1192342023 |a 1228545597 |a 1391569258 | ||
020 | |a 9780080555881 |q (electronic bk.) | ||
020 | |a 0080555888 |q (electronic bk.) | ||
020 | |a 1281096172 | ||
020 | |a 9781281096173 | ||
020 | |a 9786611096175 | ||
020 | |a 6611096175 | ||
020 | |z 9780123735669 |q (pbk. ; |q alk. paper) | ||
020 | |z 0123735661 |q (pbk. ; |q alk. paper) | ||
029 | 1 | |a AU@ |b 000043178412 | |
029 | 1 | |a AU@ |b 000051562616 | |
029 | 1 | |a CHNEW |b 001007376 | |
029 | 1 | |a DEBBG |b BV039829430 | |
029 | 1 | |a DEBBG |b BV042305715 | |
029 | 1 | |a DEBBG |b BV043095540 | |
029 | 1 | |a DEBSZ |b 405318782 | |
029 | 1 | |a DEBSZ |b 422157082 | |
029 | 1 | |a GBVCP |b 802413390 | |
029 | 1 | |a NZ1 |b 12479010 | |
029 | 1 | |a NZ1 |b 14540495 | |
029 | 1 | |a NZ1 |b 15189658 | |
029 | 1 | |a UKMGB |b 017585178 | |
035 | |a (OCoLC)190760120 |z (OCoLC)228148418 |z (OCoLC)473204748 |z (OCoLC)647692047 |z (OCoLC)961595880 |z (OCoLC)962700702 |z (OCoLC)984786104 |z (OCoLC)988441715 |z (OCoLC)991961986 |z (OCoLC)995040134 |z (OCoLC)1037793297 |z (OCoLC)1038674304 |z (OCoLC)1045455063 |z (OCoLC)1055378383 |z (OCoLC)1081286609 |z (OCoLC)1103267677 |z (OCoLC)1129355989 |z (OCoLC)1152985238 |z (OCoLC)1161999502 |z (OCoLC)1192342023 |z (OCoLC)1228545597 |z (OCoLC)1391569258 | ||
037 | |a 134565:134696 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .I5247 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
245 | 0 | 0 | |a Information assurance : |b dependability and security in networked systems / |c [edited by] Yi Qian [and others]. |
260 | |a Amsterdam ; |a Boston : |b Elsevier/Morgan Kaufmann, |c ©2008. | ||
300 | |a 1 online resource (xxxvii, 537 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Morgan Kaufmann series in networking | |
490 | 1 | |a The Morgan Kaufmann series in computer security | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. | |
520 | 8 | |a In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks. | |
520 | 8 | |a Printbegrænsninger: Der kan printes kapitelvis. | |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer networks |x Reliability. | |
650 | 0 | |a Computer security. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Fiabilité. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Computer networks |x Reliability. |2 blmlsh | |
650 | 7 | |a Computer security. |2 blmlsh | |
650 | 7 | |a Computer networks |x Reliability. |2 fast |0 (OCoLC)fst00872335 | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
700 | 1 | |a Qian, Yi, |d 1962- | |
776 | 0 | 8 | |i Print version: |t Information assurance. |d Amsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008 |z 9780123735669 |z 0123735661 |w (DLC) 2007033726 |w (OCoLC)166290628 |
830 | 0 | |a Morgan Kaufmann series in networking. | |
830 | 0 | |a Morgan Kaufmann series in computer security. | |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214765 |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00037350 | ||
938 | |a ebrary |b EBRY |n ebr10204358 | ||
938 | |a EBSCOhost |b EBSC |n 214765 | ||
938 | |a YBP Library Services |b YANK |n 2754827 | ||
938 | |a Internet Archive |b INAR |n informationassur0000unse | ||
994 | |a 92 |b IZTAP |