|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1273728044 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
210910t20222022flua obf 001 0 eng |
010 |
|
|
|a 2021043553
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d TYFRS
|d OCLCF
|d OCLCO
|d YDX
|d UKAHL
|d YDX
|d OCLCO
|d ORMDA
|d N$T
|d OCLCQ
|d OCLCA
|d SFB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1342443141
|
020 |
|
|
|a 9780367808228
|q electronic book
|
020 |
|
|
|a 0367808226
|q electronic book
|
020 |
|
|
|a 9781000540567
|q electronic book
|
020 |
|
|
|a 1000540561
|q electronic book
|
020 |
|
|
|a 9781000540550
|q electronic book
|
020 |
|
|
|a 1000540553
|q electronic book
|
020 |
|
|
|z 9780367365721
|q hardcover
|
020 |
|
|
|z 9781032203751
|q paperback
|
029 |
1 |
|
|a AU@
|b 000070178077
|
035 |
|
|
|a (OCoLC)1273728044
|z (OCoLC)1342443141
|
037 |
|
|
|a 9780367808228
|b Taylor & Francis
|
037 |
|
|
|a 9781000540567
|b O'Reilly Media
|
042 |
|
|
|a pcc
|
050 |
0 |
4 |
|a TK5105.59
|b .I527 2022eb
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a TGP
|2 bicssc
|
082 |
0 |
0 |
|a 005.8
|2 23/eng/20211110
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Information security handbook /
|c edited by Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and João Manuel R.S. Tavares.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Boca Raton, FL :
|b CRC Press,
|c 2022.
|
264 |
|
4 |
|c ©2022
|
300 |
|
|
|a 1 online resource :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Internet of everything (IoE): security and privacy paradigm
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a 1. Information Security Introduction. 2. History and Background of IS. 3. Security in Personal Computers. 4. Security in Gadgets. 5. Banking Threats and Counter Measures. 6. Cryptocurrencies Threats and Counter Measures. 7. Blockchain Security Issues. 8. Power plant Systems Threats and Counter Measures. 9. Security in Avionics Systems. 10. Big Data and Security Issues. 11. Security in Cloud Computing. 12. Clusters Security. 13. Information Security in the Modern Enterprise. 14. Information Security in IIoT. 15. Building a Secure Organization. 16. Detecting System Intrusions. 17. Preventing System Intrusions. 18. Guarding Against Network Intrusions. 19. Information Security in Industry 4.0. 20. Securing Web Applications, Services and Servers. 21. Internet Security. 22. The Botnet Issues. 23. Intranet Security Issues. 24. Wireless Network Security. 25. Wireless Body Area Security. 26. Wireless Sensor Network Security. 27. Security for the Internet of Things. 28. Information Security of E-Health Applications. 29. Cellular Network Security. 30. Security Risk Management. 31. Information Security Essentials for IT Professionals. 32. Protecting and or safeguarding Mission-Critical Systems. 33. Security Management Systems (SMS). 34. Information Security in Fog Cloud. 35. Private Cloud Security. 36. Virtual Private Cloud Security. 37. Protecting Virtual Infrastructure. 38. SDN and NFV Security. 39. Cyber-Physical Systems Security. 40. Penetration Testing. 41. Access Controls. 42. Endpoint Security. 43. Securing the Infrastructure. 44. Cyber Warfare.
|
520 |
|
|
|a "This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts, serves as a manual for industry, while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through IoT ecosystem and implications to the real world and at the same time explains the concepts of IoT-related technologies, trends, and future directions. University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful"--
|c Provided by publisher.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on March 11, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS / Data Processing / General
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS / Information Technology
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Zaman, Noor,
|d 1972-
|e editor.
|
700 |
1 |
|
|a Hussain, Khalid,
|e editor.
|
700 |
1 |
|
|a Humayun, Mamoona,
|e editor.
|
700 |
1 |
|
|a Abdullah, Azween Bin,
|d 1961-
|e editor.
|
700 |
1 |
|
|a Tavares, João Manuel R. S.,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Information security handbook
|b First edition.
|d Boca Raton : CRC Press, [2022]
|z 9780367365721
|w (DLC) 2021043552
|
830 |
|
0 |
|a Internet of everything (IoE).
|p Security and privacy paradigm.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781000540567/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39158166
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39158165
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17786693
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3024727
|
994 |
|
|
|a 92
|b IZTAP
|