|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn953413023 |
003 |
OCoLC |
005 |
20231120112121.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
160711s2016 mau ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e rda
|e pn
|c OPELS
|d OCLCO
|d YDXCP
|d UIU
|d OCLCF
|d OCLCO
|d GGVRL
|d Z5A
|d U3W
|d OCLCA
|d D6H
|d EZ9
|d OCLCQ
|d WYU
|d UKMGB
|d S2H
|d OCLCO
|d REDDC
|d LVT
|d UX1
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB687259
|2 bnb
|
016 |
7 |
|
|a 017897568
|2 Uk
|
019 |
|
|
|a 956735860
|a 1162517946
|a 1229062722
|a 1229131999
|a 1229383867
|a 1235115689
|a 1235822386
|a 1257356311
|a 1259586377
|a 1300437561
|
020 |
|
|
|a 9780128096468
|
020 |
|
|
|a 0128096462
|
020 |
|
|
|z 9780128096437
|q (print)
|
020 |
|
|
|z 0128096438
|q (print)
|
035 |
|
|
|a (OCoLC)953413023
|z (OCoLC)956735860
|z (OCoLC)1162517946
|z (OCoLC)1229062722
|z (OCoLC)1229131999
|z (OCoLC)1229383867
|z (OCoLC)1235115689
|z (OCoLC)1235822386
|z (OCoLC)1257356311
|z (OCoLC)1259586377
|z (OCoLC)1300437561
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Young, Carl S.,
|e author.
|
245 |
1 |
0 |
|a Information security science :
|b measuring the vulnerability to data compromises /
|c Carl S. Young.
|
264 |
|
1 |
|a Cambridge, MA :
|b Syngress is an imprint of Elsevier,
|c 2016.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ScienceDirect, viewed July 11, 2016).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a I. Threats, risk and risk assessments -- Information security threats and risk -- Modeling information security risk -- II. Scientific fundamentals -- Physics and information security -- Electromagnetic waves -- III. The compromise of signals -- Signals of information security -- The compromise of electromagnetic signals -- Countermeasures to electromagnetic signal compromises -- Visual information security -- Audible information security -- IV. Information technology risk -- Information technology risk factors -- Information technology risk measurements and metrics -- Special information technology risk measurements and metrics -- V. The physical security of information assets -- Physical security controls -- Data centers : a concentration of information security risk.
|
520 |
|
|
|a Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes connections between information security, physical security, information technology, and information theory.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Technologie de l'information
|0 (CaQQLa)201-0023285
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|0 (OCoLC)fst00973129
|
776 |
0 |
8 |
|i Print version:
|a Young, Carl S.
|t Information security science : measuring the vulnerability to data compromises.
|d Amsterdam, [Netherlands] : Syngress, �2016
|h xx, 385 pages
|z 9780128096437
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128096437
|z Texto completo
|