|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn298229756 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
090113s2008 njua ob 001 0 eng d |
040 |
|
|
|a OSU
|b eng
|e pn
|c OSU
|d CDX
|d DLC
|d IG#
|d OCLCQ
|d N$T
|d YDXCP
|d IDEBK
|d OCLCQ
|d E7B
|d OCLCQ
|d OCLCF
|d OCLCQ
|d M6U
|d OCLCQ
|d AZK
|d INTCL
|d LOA
|d JBG
|d COCUF
|d AGLDB
|d CNNOR
|d MOR
|d PIFAG
|d OTZ
|d OCLCQ
|d OCLCA
|d BRL
|d STF
|d WRM
|d OCLCQ
|d VTS
|d NRAMU
|d OCLCQ
|d VT2
|d OCLCQ
|d WYU
|d A6Q
|d M8D
|d UKAHL
|d UKCRE
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 262621123
|a 646769025
|a 696629527
|a 961542557
|a 962595619
|a 968299051
|a 988449581
|a 992050317
|a 994896091
|a 1037496528
|a 1037758565
|a 1038629602
|a 1045467079
|a 1055401714
|a 1062889935
|a 1063995129
|a 1081295906
|a 1083604008
|a 1153529167
|a 1228550728
|
020 |
|
|
|a 9789812703682
|
020 |
|
|
|a 9812703683
|
020 |
|
|
|a 9812790888
|q (ebook)
|
020 |
|
|
|a 9789812790880
|q (ebook)
|
029 |
1 |
|
|a AU@
|b 000051418842
|
029 |
1 |
|
|a DEBBG
|b BV043128747
|
029 |
1 |
|
|a DEBSZ
|b 422095486
|
029 |
1 |
|
|a GBVCP
|b 802748597
|
029 |
1 |
|
|a IG#
|b 9789812703682
|
029 |
1 |
|
|a NZ1
|b 13335527
|
035 |
|
|
|a (OCoLC)298229756
|z (OCoLC)262621123
|z (OCoLC)646769025
|z (OCoLC)696629527
|z (OCoLC)961542557
|z (OCoLC)962595619
|z (OCoLC)968299051
|z (OCoLC)988449581
|z (OCoLC)992050317
|z (OCoLC)994896091
|z (OCoLC)1037496528
|z (OCoLC)1037758565
|z (OCoLC)1038629602
|z (OCoLC)1045467079
|z (OCoLC)1055401714
|z (OCoLC)1062889935
|z (OCoLC)1063995129
|z (OCoLC)1081295906
|z (OCoLC)1083604008
|z (OCoLC)1153529167
|z (OCoLC)1228550728
|
050 |
|
4 |
|a QA76.9.A25
|b Z69 2008
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Zou, Xukai,
|d 1963-
|
245 |
1 |
0 |
|a Trust and security in collaborative computing /
|c Xukai Zou, Yuan-Shun Dai, Yi Pan.
|
260 |
|
|
|a Hackensack, NJ :
|b World Scientific,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xvii, 229 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Computer and network security ;
|v v. 2
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g 1.
|t Introduction --
|g 2.
|t Secure Group Communication (SCG) --
|g 3.
|t Cryptography based Access Control --
|g 4.
|t Intrusion Detection and Defense --
|g 5.
|t Reliability in Grid Computing --
|g 6.
|t Security in Grid Computing --
|g 7.
|t Trusted and Seamless Medical Information Systems.
|
520 |
|
|
|a "Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet." "This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described."--Jacket
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Groupware (Computer software)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Logiciels de groupe.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Groupware (Computer software)
|2 fast
|0 (OCoLC)fst00948552
|
700 |
1 |
|
|a Dai, Yuan-Shun.
|
700 |
1 |
|
|a Pan, Yi,
|d 1960-
|
776 |
1 |
|
|a Zou, Xukai, 1963-
|t Trust and security in collaborative computing.
|d Hackensack, NJ : World Scientific, ©2008
|z 9789812703682
|w (DLC) 2008273479
|w (OCoLC)227206004
|
830 |
|
0 |
|a Computer and network security ;
|v v. 2.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=236058
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24684926
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 9528552
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10255980
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 236058
|
938 |
|
|
|a Ingram
|b INGR
|n 9789812703682
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2891968
|
994 |
|
|
|a 92
|b IZTAP
|