|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn647810567 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
050309s2006 njua obf 001 0 eng d |
010 |
|
|
|z 2005006851
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCQ
|d N$T
|d IDEBK
|d OCLCQ
|d UMI
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d COO
|d OCLCQ
|d CEF
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 744965852
|a 814385697
|a 857068244
|a 1103268521
|
020 |
|
|
|a 9780470051191
|q (electronic bk.)
|
020 |
|
|
|a 0470051191
|q (electronic bk.)
|
020 |
|
|
|a 128040938X
|
020 |
|
|
|a 9781280409387
|
020 |
|
|
|z 9780471648307
|
020 |
|
|
|z 0471648302
|
029 |
1 |
|
|a AU@
|b 000052006994
|
029 |
1 |
|
|a DEBBG
|b BV041431864
|
029 |
1 |
|
|a DEBSZ
|b 398277427
|
029 |
1 |
|
|a GBVCP
|b 785370366
|
029 |
1 |
|
|a AU@
|b 000067095192
|
035 |
|
|
|a (OCoLC)647810567
|z (OCoLC)744965852
|z (OCoLC)814385697
|z (OCoLC)857068244
|z (OCoLC)1103268521
|
037 |
|
|
|a CL0500000270
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .H351 2006eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UXAS
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Handbook of information security .
|n Volume 1,
|p Key concepts, infrastructure, standards, and protocols /
|c Hossein Bidgoli, editor-in-chief.
|
246 |
3 |
0 |
|a Key concepts, infrastructure, standards, and protocols
|
260 |
|
|
|a Hoboken, N.J. :
|b John Wiley,
|c ©2006.
|
300 |
|
|
|a 1 online resource (xxvii, 1092 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and indexes.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover -- Contents -- Preface -- Guide to The Handbook of Information Security -- PART 1: Key Concepts and Applications Related to Information Security -- Internet Basics -- INTRODUCTION -- INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB -- DOMAIN NAME SYSTEMS -- NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES -- INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE -- WHAT IS AN INTRANET? -- INTERNET VERSUS INTRANETS -- SELECTED APPLICATIONS OF AN INTRANET -- WHAT IS AN EXTRANET? -- SELECTED INTERNET APPLICATIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Economy -- INTRODUCTION -- INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE -- SIZE AND GROWTH OF THE DIGITAL ECONOMY -- IMPLICATIONS FOR MARKETS AND ORGANIZATIONS -- SECURITY -- GOVERNMENT POLICIES -- WORK, PLAY, AND COMMUNITIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Retail Banking: Security Concerns, Breaches, and Controls -- INTRODUCTION -- TYPES OF ONLINE RETAIL BANKING SERVICES -- ONLINE BANKING SECURITY CONCERNS -- DEFINITION OF SECURITY -- SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES -- SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Libraries: Security and Preservation Considerations -- INTRODUCTION -- CONSTRUCTING DIGITAL LIBRARIES -- SECURITY AND DIGITAL LIBRARIES -- PRESERVATION AND DIGITAL LIBRARIES -- CONTINUITY OF DIGITAL LIBRARIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- E-Mail and Instant Messaging -- INTRODUCTION -- ELECTRONIC MAIL -- INSTANT MESSAGING -- SECURITY IN E-MAIL AND IM ENVIRONMENTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Internet Relay Chat -- SECURE COMMUNICATION USING INTERNET RELAY CHAT -- STRUCTURE AND OPERATION -- SOCIAL FACTORS -- SECURITY AND LEGAL ISSUES -- FUTURE OF IRC -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Communities -- INTRODUCTION -- DEFINITION AND ATTRIBUTES -- HISTORY OF ONLINE COMMUNITIES -- TYPES OF ONLINE COMMUNITIES -- ONLINE COMMUNITY CONSEQUENCES -- RESEARCH METHODS AND ISSUES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Groupware: Risks, Threats, and Vulnerabilities in the Internet Age -- INTRODUCTION -- WHY GROUPWARE? -- GROUPWARE AND SECURITY -- DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE -- GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE -- GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Search Engines: Security, Privacy, and Ethical Issues -- INTRODUCTION -- SEARCHER -- SEARCH ENGINE -- WEB SITE -- SEARCH ETHICS -- CONCLUSION -- GLOSS.
|
520 |
|
|
|a The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Home computer networks.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux locaux domestiques (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Home computer networks
|2 fast
|
700 |
1 |
|
|a Bidgoli, Hossein.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780471648307/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10308281
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 152289
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 40938
|
994 |
|
|
|a 92
|b IZTAP
|