|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn647806652 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
050309s2006 njua ob 001 0 eng d |
010 |
|
|
|z 2005006851
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCQ
|d IDEBK
|d OCLCQ
|d OCLCF
|d UMI
|d DEBBG
|d OCLCO
|d OCLCQ
|d COO
|d OCLCQ
|d CEF
|d AU@
|d STF
|d VT2
|d RDF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 744646330
|a 814385698
|a 872560607
|a 1044366321
|a 1056450262
|a 1058988275
|a 1100271014
|a 1103251081
|a 1129378396
|
020 |
|
|
|a 1280409398
|
020 |
|
|
|a 9781280409394
|
020 |
|
|
|z 9780471648314
|
020 |
|
|
|z 0471648310
|
029 |
1 |
|
|a DEBBG
|b BV042031659
|
029 |
1 |
|
|a DEBSZ
|b 414171144
|
035 |
|
|
|a (OCoLC)647806652
|z (OCoLC)744646330
|z (OCoLC)814385698
|z (OCoLC)872560607
|z (OCoLC)1044366321
|z (OCoLC)1056450262
|z (OCoLC)1058988275
|z (OCoLC)1100271014
|z (OCoLC)1103251081
|z (OCoLC)1129378396
|
037 |
|
|
|a CL0500000400
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .H352 2006eb
|
072 |
|
7 |
|a KM
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Handbook of information security
|n Volume 2,
|p Information warfare ; social, legal, and international issues ; and security foundations /
|c Hossein Bidgoli, editor-in-chief.
|
260 |
|
|
|a Hoboken, N.J. :
|b John Wiley,
|c ©2006.
|
300 |
|
|
|a 1 online resource (xxvii, 978 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and indexes.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover -- Contents -- Contributors -- Preface -- Guide to The Handbook of Information Security Guide to The Handbook of Information Security -- PART 1: Information Warfare -- Cybercrime and the U.S. Criminal Justice System -- INTRODUCTION -- DIFFERENCES FROM CIVIL JUSTICE SYSTEM -- BASIC INSTITUTIONAL STRUCTURE -- RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS -- CRIMINAL JUSTICE SYSTEM AND CYBERCRIME -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Cyberterrorism and Information Security -- INTRODUCTION -- DEFINING CYBERTERRORISM -- HOW CYBERTERRORISM OCCURS -- SPONSORS AND SUPPORT -- CONTROLLING CYBERTERRORISM -- WHO WILL WIN THE BATTLE OF CYBERTERRORISM? -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Online Stalking -- WHAT IS ONLINE STALKING? -- HOW MUCH OF A PROBLEM IS ONLINE STALKING? -- WHAT CAN YOU DO IF YOU ARE A VICTIM? -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Electronic Attacks -- INTRODUCTION -- RECONNAISSANCE PHASE -- ATTACK PHASE -- DETECTION AVOIDANCE PHASE -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Wireless Information Warfare -- INTRODUCTION -- DEFINITION OF WIRELESS INFORMATION WARFARE -- TAXONOMIES OF INFORMATION WARFARE -- TAXONOMIES OF WIRELESS NETWORKS -- UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE -- SECURE COMMUNICATIONS SYSTEM DESIGN -- OFFENSIVE INFORMATION OPERATIONS -- DEFENSIVE INFORMATION OPERATIONS -- WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL -- EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK (VLAN HOPPING) -- EXAMPLE DEFENSE: METHODS OF DEFENSE -- CONCLUSIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Computer Network Operations (CNO) -- INTRODUCTION -- NETWORK DEFENSE AND NETWORK ATTACK -- A MODEL OF COMPUTER NETWORK ATTACK -- TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE -- SURVIVABILITY -- DECEPTION -- DECEPTION TAXONOMY -- STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS -- IMPLEMENTING COMPUTER NETWORK OPERATIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Electronic Protection -- INTRODUCTION -- ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY -- REDUCING THE THREAT OF ELECTRONIC EMANATIONS -- PROTECTING AGAINST OFFENSIVE SIGNALS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Information Assurance -- INTRODUCTION -- OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIES -- INTRUSION MASKING TECHNOLOGIES -- DEFENSE IN DEPTH TECHNOLOGIES -- CONCLUSION -- ACKNOWLEDGMENT -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- PART 2: Social and Legal Issues -- The Legal Implications of Information Security: Regulatory Compliance and Liability -- INTRODUCTION -- WHAT IS AT RISK? -- STATUTORY AND REGULATORY COMPLIANCE -- CONTRACTUAL LIABILITY -- TORT LIABILITY -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES.
|
520 |
|
|
|a The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Home computer networks.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux locaux domestiques (Informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Home computer networks
|2 fast
|
700 |
1 |
|
|a Bidgoli, Hossein.
|
776 |
0 |
8 |
|i Print version:
|t Handbook of information security.
|d Hoboken, N.J. : John Wiley, ©2006
|w (DLC) 2005006851
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780471648314/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10307435
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 40939
|
994 |
|
|
|a 92
|b IZTAP
|