Cargando…

Securing information and communications systems : principles, technologies, and applications /

This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Furnell, Steven, 1970-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Artech House, ©2008.
Colección:Artech House information security and privacy series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn434586632
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 090829s2008 maua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d EBLCP  |d OCLCQ  |d MHW  |d OCLCQ  |d OCLCF  |d DEBSZ  |d OCLCQ  |d NLGGC  |d OCLCA  |d YDXCP  |d OCLCQ  |d AZK  |d LOA  |d JBG  |d AGLDB  |d MOR  |d ZCU  |d OTZ  |d LIV  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d WRM  |d OCLCQ  |d VTS  |d XOS  |d NRAMU  |d ICG  |d OCLCQ  |d INT  |d CUY  |d COO  |d OCLCQ  |d A6Q  |d DKC  |d OCLCQ  |d M8D  |d UKAHL  |d OCLCQ  |d UKCRE  |d BRF  |d OCLCO  |d OCL  |d OCLCQ 
019 |a 961546543  |a 962685774  |a 966197310  |a 988527987  |a 994922253  |a 1037929839  |a 1038566284  |a 1045516444  |a 1083557707  |a 1153556486 
020 |a 9781596932296  |q (electronic bk.) 
020 |a 1596932295  |q (electronic bk.) 
020 |z 1596932287 
029 1 |a AU@  |b 000054169266 
029 1 |a DEBBG  |b BV043074287 
029 1 |a DEBBG  |b BV044138047 
029 1 |a DEBSZ  |b 39629118X 
029 1 |a DEBSZ  |b 421964839 
029 1 |a DEBSZ  |b 456455132 
029 1 |a DKDLA  |b 820120-katalog:999933289305765 
035 |a (OCoLC)434586632  |z (OCoLC)961546543  |z (OCoLC)962685774  |z (OCoLC)966197310  |z (OCoLC)988527987  |z (OCoLC)994922253  |z (OCoLC)1037929839  |z (OCoLC)1038566284  |z (OCoLC)1045516444  |z (OCoLC)1083557707  |z (OCoLC)1153556486 
050 4 |a QA76.9.A25  |b S37563 2008eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Securing information and communications systems :  |b principles, technologies, and applications /  |c Steven M. Furnell [and others], editors. 
260 |a Boston :  |b Artech House,  |c ©2008. 
300 |a 1 online resource (xiv, 362 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Artech House information security and privacy series 
504 |a Includes bibliographical references and index. 
505 0 |a Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security. 
520 |a This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
650 0 |a Public key infrastructure (Computer security) 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Infrastructure à clé publique (Sécurité informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Public key infrastructure (Computer security)  |2 fast  |0 (OCoLC)fst01082563 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
700 1 |a Furnell, Steven,  |d 1970- 
776 0 8 |i Print version:  |t Securing information and communications systems.  |d Boston : Artech House, ©2008  |z 1596932287  |z 9781596932289  |w (DLC) 2008271231  |w (OCoLC)213468741 
830 0 |a Artech House information security and privacy series. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284257  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25703089 
938 |a EBL - Ebook Library  |b EBLB  |n EBL456881 
938 |a EBSCOhost  |b EBSC  |n 284257 
938 |a IEEE  |b IEEE  |n 9100352 
938 |a YBP Library Services  |b YANK  |n 3061288 
994 |a 92  |b IZTAP