Cargando…

Aspects of network and information security /

Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specif...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores Corporativos: NATO Advanced Study Institute on Network Security and Intrusion Detection Yerevan, Armenia, North Atlantic Treaty Organization. Public Diplomacy Division, NATO Science for Peace and Security Programme, IOS Press
Otros Autores: Kranakis, Evangelos, Haroutunian, Evgueni A., Shahbazian, E. (Elisa)
Formato: Electrónico Congresos, conferencias eBook
Idioma:Inglés
Publicado: Amsterdam ; Washington D.C. : IOS Press, ©2008.
Colección:NATO science for peace and security series. Information and communication security ; v. 17.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn491261484
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 091221s2008 ne a ob 101 0 eng d
010 |a  2008928730 
040 |a IOSPR  |b eng  |e pn  |c IOSPR  |d IOSPR  |d N$T  |d MEAUC  |d IDEBK  |d E7B  |d OCLCQ  |d ALAUL  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCO  |d YDXCP  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d AZK  |d LOA  |d COCUF  |d AGLDB  |d MOR  |d PIFAG  |d OCLCQ  |d STF  |d WRM  |d VTS  |d NRAMU  |d VT2  |d OCLCQ  |d WYU  |d ICG  |d M8D  |d UKCRE  |d UKAHL  |d OCLCO  |d OCLCQ 
019 |a 283799162  |a 503443999  |a 646786509  |a 961563638  |a 962626296  |a 966144930  |a 988411189  |a 991920930  |a 1037784035  |a 1038593640  |a 1045474512  |a 1055349775  |a 1066442879  |a 1077247622  |a 1081217655  |a 1153459251  |a 1228586715 
020 |a 9781607503262 
020 |a 1607503263 
020 |a 9781435677999  |q (electronic bk.) 
020 |a 1435677994  |q (electronic bk.) 
020 |a 9786000006358  |q (ebook) 
020 |a 6000006357  |q (ebook) 
020 |z 1586038567 
020 |z 9781586038564 
029 1 |a AU@  |b 000046687195 
029 1 |a DEBBG  |b BV043169459 
029 1 |a DEBSZ  |b 422079421 
029 1 |a GBVCP  |b 803036221 
029 1 |a NZ1  |b 13335190 
035 |a (OCoLC)491261484  |z (OCoLC)283799162  |z (OCoLC)503443999  |z (OCoLC)646786509  |z (OCoLC)961563638  |z (OCoLC)962626296  |z (OCoLC)966144930  |z (OCoLC)988411189  |z (OCoLC)991920930  |z (OCoLC)1037784035  |z (OCoLC)1038593640  |z (OCoLC)1045474512  |z (OCoLC)1055349775  |z (OCoLC)1066442879  |z (OCoLC)1077247622  |z (OCoLC)1081217655  |z (OCoLC)1153459251  |z (OCoLC)1228586715 
037 |a 978-1-58603-856-4  |b IOS Press  |n http://www.iospress.nl 
050 4 |a TK5105.59  |b .A87 2008eb 
072 7 |a COM  |x SOC000000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
111 2 |a NATO Advanced Study Institute on Network Security and Intrusion Detection  |d (2005 :  |c Yerevan, Armenia) 
245 1 0 |a Aspects of network and information security /  |c edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian. 
260 |a Amsterdam ;  |a Washington D.C. :  |b IOS Press,  |c ©2008. 
300 |a 1 online resource (ix, 355 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a NATO science for peace and security series. Sub-series D: Information and communication security,  |x 1874-6268 ;  |v v. 17 
500 |a "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005." 
500 |a "Published in cooperation with NATO Public Diplomacy Division." 
504 |a Includes bibliographical references and index. 
505 0 0 |g Preface -- Section I: Network security:  |t Network security and survivability: using wireless overlay networks for critical infrastructure protection /  |r M. Bermester --  |t Security when routers are taken over by the adversary /  |r Y. Desmedt --  |t Security in quantum cryptography and quantum networks /  |r J. Gruska --  |t The case for self-healing software /  |r A.D. Keromytis --  |t Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" /  |r I. Kotenko --  |t Formal treatment of secure protocols: an introduction /  |r D. Krizanc, J. Lipton --  |t Behavioral and structural properties of malicious code /  |r C. Kruegel --  |t Security from the practitioner's point of view /  |r M. Oit --  |t Mobile and wireless communications security /  |r B. Preneel --  |t Humanitarian problems in information security /  |r V. Tairyan [and others] --  |t Multimedia security: open problems and solutions /  |r S. Voloshynovskiy [and others] --  |t A selective introduction to border gateway protocol (BGP) security issues /  |r T. Wan, P.C. van Oorschot, E. Kranakis --  |g Section II: Information security:  |t Steganography & steganalysis an overview of research & challenges /  |r S.S. Agaian --  |t Guessing and cryptography /  |r E. Arikan --  |t The exact approximate encryption of quantum information /  |r J. Bouda --  |t A new approach to stochastic quantum processes, their manipulation and control /  |r A. Gevorkyan --  |t Reliability approach in Wiretapper guessing theory /  |r E.A. Haroutunian --  |t E-capacity of information hiding systems /  |r M.E. Haroutunian --  |t Quasicrystals in cryptography /  |r J. Patera, M. Nesterenko --  |t Asymptotic investigation of mutual information and capacity of certain communication channels /  |r V. Prelov --  |t Information theory of covert timing channels /  |r A.B Wagner, V. Anantharam --  |g Section III: Coding:  |t A survey of new results in coding with feedback and searching with lies /  |r C. Deppe --  |t Remarks on e-optimal rate function in DMS coding /  |r A. Harutyunyan --  |t Reconstruction of data distorted by some errors /  |r E. Konstantinova --  |t On (w, r) cover-free codes /  |r V. Lebedev --  |t Switching methods for error-correcting codes /  |r F. Solovéva --  |t On reconstruction of functions on the hypercube /  |r A. Vasiléva. 
520 |a Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a Information networks  |x Security measures  |v Congresses. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Congrès. 
650 6 |a Réseaux d'information  |x Sécurité  |x Mesures  |v Congrès. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Information networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00972588 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Kranakis, Evangelos. 
700 1 |a Haroutunian, Evgueni A. 
700 1 |a Shahbazian, E.  |q (Elisa) 
710 2 |a North Atlantic Treaty Organization.  |b Public Diplomacy Division. 
710 2 |a NATO Science for Peace and Security Programme. 
710 2 |a IOS Press. 
776 0 8 |i Print version:  |a NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia).  |t Aspects of network and information security.  |d Amsterdam ; Washington D.C. : IOS Press, ©2008  |z 9781586038564  |z 1586038567  |w (DLC) 2008928730  |w (OCoLC)244320577 
830 0 |a NATO science for peace and security series.  |n Sub-series D,  |p Information and communication security ;  |v v. 17. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244467  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28330266 
938 |a EBSCOhost  |b EBSC  |n 244467 
938 |a YBP Library Services  |b YANK  |n 2919812 
938 |a YBP Library Services  |b YANK  |n 3318027 
994 |a 92  |b IZTAP