|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn271872721 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m go d |
007 |
cr mnu---uuuuu |
008 |
080911s2006 njua ob 001 0 eng d |
040 |
|
|
|a AU@
|b eng
|e pn
|c AU@
|d OCLCQ
|d E7B
|d N$T
|d OCLCQ
|d OCLCF
|d IDEBK
|d UMI
|d DEBBG
|d OCLCQ
|d COO
|d OCLCQ
|d CEF
|d VT2
|d UAB
|d OCLCO
|d OCLCQ
|d TOH
|d OCLCQ
|
019 |
|
|
|a 647809591
|a 814385666
|a 878852635
|a 1044331446
|a 1056425423
|a 1058906229
|a 1060907920
|a 1103256662
|a 1129359795
|a 1153037600
|
020 |
|
|
|a 9780470051214
|q (electronic bk.)
|
020 |
|
|
|a 0470051213
|q (electronic bk.)
|
020 |
|
|
|a 1280409088
|
020 |
|
|
|a 9781280409080
|
020 |
|
|
|z 0471648329
|
020 |
|
|
|z 9780471648321
|
029 |
0 |
|
|a AU@
|b 000043398589
|
029 |
1 |
|
|a AU@
|b 000067095193
|
029 |
1 |
|
|a DEBBG
|b BV042031672
|
029 |
1 |
|
|a DEBSZ
|b 414171284
|
029 |
1 |
|
|a GBVCP
|b 802712487
|
035 |
|
|
|a (OCoLC)271872721
|z (OCoLC)647809591
|z (OCoLC)814385666
|z (OCoLC)878852635
|z (OCoLC)1044331446
|z (OCoLC)1056425423
|z (OCoLC)1058906229
|z (OCoLC)1060907920
|z (OCoLC)1103256662
|z (OCoLC)1129359795
|z (OCoLC)1153037600
|
037 |
|
|
|a CL0500000421
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .H353 2006eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a KM
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Handbook of information security.
|n Volume 3,
|p Threats, vulnerabilities, prevention, detection, and management /
|c Hossein Bidgoli, editor-in-chief.
|
246 |
3 |
0 |
|a Threats, vulnerabilities, prevention, detection, and management
|
260 |
|
|
|a Hoboken, N.J. :
|b John Wiley,
|c ©2006.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Preface -- Guide to The Handbook of Information Security -- Internal Security Threats -- Physical Security Threats -- Fixed-Line Telephone System Vulnerabilities -- E-Mail Threats and Vulnerabilities -- E-Commerce Vulnerabilities -- Hacking Techniques in Wired Networks Hacking -- Hacking Techniques in Wireless Networks -- Computer Viruses and Worms -- Trojan Horse Programs -- Hoax Viruses and Virus Alerts -- Hostile Java Applets -- Spyware -- Mobile Code and Security -- Wireless Threats and Attacks -- WEP Security -- Bluetooth Security -- Cracking WEP -- Denial of Service Attacks -- Network Attacks -- Fault Attacks -- Side-Channel Attacks -- Physical Security Measures -- RFID and Security -- Cryptographic Privacy Protection Techniques -- Cryptographic Hardware Security Modules -- Smart Card Security -- Client-Side Security -- Server-Side Security -- Protecting Web Sites -- Database Security -- Medical Records Security -- Access Control: Principles and Solutions -- Password Authentication -- Computer and Network Authentication -- Antivirus Technology -- Biometric Basics and Biometric Authentication -- Issues and Concerns in Biometric IT Security -- Firewall Basics -- Firewall Architectures -- Packet Filtering and Stateful Firewalls -- Proxy Firewalls -- E-Commerce Safeguards -- Digital Signatures and Electronic Signatures -- E-Mail Security -- Security for ATM Networks -- VPN Basics -- VPN Architecture -- IP-Based VPN -- Identity Management -- The Use of Deception Techniques: Honeypots and Decoys -- Active Response to Computer Intrusions -- Intrusion Detection Systems Basics -- Host-Based Intrusion Detection Systems -- Network-Based Intrusion Detection Systems -- The Use of Agent Technology for Intrusion Detection -- Contingency Planning Management -- Computer Security Incident Response Teams (CSIRTs) -- Implementing a Security Awareness Program -- Risk Management for IT Security -- Security Insurance and Best Practices -- Auditing Information Systems Security -- Evidence Collection and Analysis Tools -- Information Leakage: Detection and Countermeasures -- Digital Rights Management -- Web Hosting -- Managing a Network Environment -- E-Mail and Internet Use Policies -- Forward Security Adaptive Cryptography: Time Evolution -- Security Policy Guidelines -- Asset- Security Goals Continuum: A Process for Security -- Multilevel Security -- Multilevel Security Models -- Security Architectures -- Quality of Security Service: Adaptive Security -- Security Policy Enforcement -- Guidelines for a Comprehensive Security System.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Home computer networks.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux locaux domestiques (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Home computer networks.
|2 fast
|0 (OCoLC)fst00959166
|
700 |
1 |
|
|a Bidgoli, Hossein.
|
776 |
0 |
8 |
|i Print version:
|t Handbook of information security.
|d Hoboken, N.J. : John Wiley, ©2006
|w (DLC) 2005006851
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780471648321/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 151863
|
994 |
|
|
|a 92
|b IZTAP
|