|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn434586632 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
090829s2008 maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d EBLCP
|d OCLCQ
|d MHW
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d NLGGC
|d OCLCA
|d YDXCP
|d OCLCQ
|d AZK
|d LOA
|d JBG
|d AGLDB
|d MOR
|d ZCU
|d OTZ
|d LIV
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d STF
|d WRM
|d OCLCQ
|d VTS
|d XOS
|d NRAMU
|d ICG
|d OCLCQ
|d INT
|d CUY
|d COO
|d OCLCQ
|d A6Q
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d UKCRE
|d BRF
|d OCLCO
|d OCL
|d OCLCQ
|
019 |
|
|
|a 961546543
|a 962685774
|a 966197310
|a 988527987
|a 994922253
|a 1037929839
|a 1038566284
|a 1045516444
|a 1083557707
|a 1153556486
|
020 |
|
|
|a 9781596932296
|q (electronic bk.)
|
020 |
|
|
|a 1596932295
|q (electronic bk.)
|
020 |
|
|
|z 1596932287
|
029 |
1 |
|
|a AU@
|b 000054169266
|
029 |
1 |
|
|a DEBBG
|b BV043074287
|
029 |
1 |
|
|a DEBBG
|b BV044138047
|
029 |
1 |
|
|a DEBSZ
|b 39629118X
|
029 |
1 |
|
|a DEBSZ
|b 421964839
|
029 |
1 |
|
|a DEBSZ
|b 456455132
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999933289305765
|
035 |
|
|
|a (OCoLC)434586632
|z (OCoLC)961546543
|z (OCoLC)962685774
|z (OCoLC)966197310
|z (OCoLC)988527987
|z (OCoLC)994922253
|z (OCoLC)1037929839
|z (OCoLC)1038566284
|z (OCoLC)1045516444
|z (OCoLC)1083557707
|z (OCoLC)1153556486
|
050 |
|
4 |
|a QA76.9.A25
|b S37563 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Securing information and communications systems :
|b principles, technologies, and applications /
|c Steven M. Furnell [and others], editors.
|
260 |
|
|
|a Boston :
|b Artech House,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xiv, 362 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Artech House information security and privacy series
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security.
|
520 |
|
|
|a This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Public key infrastructure (Computer security)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Infrastructure à clé publique (Sécurité informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Public key infrastructure (Computer security)
|2 fast
|0 (OCoLC)fst01082563
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
700 |
1 |
|
|a Furnell, Steven,
|d 1970-
|
776 |
0 |
8 |
|i Print version:
|t Securing information and communications systems.
|d Boston : Artech House, ©2008
|z 1596932287
|z 9781596932289
|w (DLC) 2008271231
|w (OCoLC)213468741
|
830 |
|
0 |
|a Artech House information security and privacy series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284257
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25703089
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL456881
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 284257
|
938 |
|
|
|a IEEE
|b IEEE
|n 9100352
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3061288
|
994 |
|
|
|a 92
|b IZTAP
|