Cargando…

Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bidgoli, Hossein
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn647810567
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 050309s2006 njua obf 001 0 eng d
010 |z  2005006851 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d N$T  |d IDEBK  |d OCLCQ  |d UMI  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d COO  |d OCLCQ  |d CEF  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 744965852  |a 814385697  |a 857068244  |a 1103268521 
020 |a 9780470051191  |q (electronic bk.) 
020 |a 0470051191  |q (electronic bk.) 
020 |a 128040938X 
020 |a 9781280409387 
020 |z 9780471648307 
020 |z 0471648302 
029 1 |a AU@  |b 000052006994 
029 1 |a DEBBG  |b BV041431864 
029 1 |a DEBSZ  |b 398277427 
029 1 |a GBVCP  |b 785370366 
029 1 |a AU@  |b 000067095192 
035 |a (OCoLC)647810567  |z (OCoLC)744965852  |z (OCoLC)814385697  |z (OCoLC)857068244  |z (OCoLC)1103268521 
037 |a CL0500000270  |b Safari Books Online 
050 4 |a TK5105.59  |b .H351 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UXAS  |2 bicssc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Handbook of information security .  |n Volume 1,  |p Key concepts, infrastructure, standards, and protocols /  |c Hossein Bidgoli, editor-in-chief. 
246 3 0 |a Key concepts, infrastructure, standards, and protocols 
260 |a Hoboken, N.J. :  |b John Wiley,  |c ©2006. 
300 |a 1 online resource (xxvii, 1092 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and indexes. 
588 0 |a Print version record. 
505 0 |a Cover -- Contents -- Preface -- Guide to The Handbook of Information Security -- PART 1: Key Concepts and Applications Related to Information Security -- Internet Basics -- INTRODUCTION -- INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB -- DOMAIN NAME SYSTEMS -- NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES -- INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE -- WHAT IS AN INTRANET? -- INTERNET VERSUS INTRANETS -- SELECTED APPLICATIONS OF AN INTRANET -- WHAT IS AN EXTRANET? -- SELECTED INTERNET APPLICATIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Economy -- INTRODUCTION -- INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE -- SIZE AND GROWTH OF THE DIGITAL ECONOMY -- IMPLICATIONS FOR MARKETS AND ORGANIZATIONS -- SECURITY -- GOVERNMENT POLICIES -- WORK, PLAY, AND COMMUNITIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Retail Banking: Security Concerns, Breaches, and Controls -- INTRODUCTION -- TYPES OF ONLINE RETAIL BANKING SERVICES -- ONLINE BANKING SECURITY CONCERNS -- DEFINITION OF SECURITY -- SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES -- SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Libraries: Security and Preservation Considerations -- INTRODUCTION -- CONSTRUCTING DIGITAL LIBRARIES -- SECURITY AND DIGITAL LIBRARIES -- PRESERVATION AND DIGITAL LIBRARIES -- CONTINUITY OF DIGITAL LIBRARIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- E-Mail and Instant Messaging -- INTRODUCTION -- ELECTRONIC MAIL -- INSTANT MESSAGING -- SECURITY IN E-MAIL AND IM ENVIRONMENTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Internet Relay Chat -- SECURE COMMUNICATION USING INTERNET RELAY CHAT -- STRUCTURE AND OPERATION -- SOCIAL FACTORS -- SECURITY AND LEGAL ISSUES -- FUTURE OF IRC -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Communities -- INTRODUCTION -- DEFINITION AND ATTRIBUTES -- HISTORY OF ONLINE COMMUNITIES -- TYPES OF ONLINE COMMUNITIES -- ONLINE COMMUNITY CONSEQUENCES -- RESEARCH METHODS AND ISSUES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Groupware: Risks, Threats, and Vulnerabilities in the Internet Age -- INTRODUCTION -- WHY GROUPWARE? -- GROUPWARE AND SECURITY -- DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE -- GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE -- GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Search Engines: Security, Privacy, and Ethical Issues -- INTRODUCTION -- SEARCHER -- SEARCH ENGINE -- WEB SITE -- SEARCH ETHICS -- CONCLUSION -- GLOSS. 
520 |a The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Home computer networks. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux locaux domestiques (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Home computer networks  |2 fast 
700 1 |a Bidgoli, Hossein. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780471648307/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ebrary  |b EBRY  |n ebr10308281 
938 |a EBSCOhost  |b EBSC  |n 152289 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 40938 
994 |a 92  |b IZTAP