|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1099525672 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
190430s2019 enka ob 001 0 eng d |
040 |
|
|
|a DG1
|b eng
|e rda
|e pn
|c DG1
|d N$T
|d EBLCP
|d N$T
|d UKAHL
|d OCLCF
|d OCLCQ
|d YDX
|d CNO
|d OCLCQ
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d UKMGB
|d IEEEE
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBC229611
|2 bnb
|
016 |
7 |
|
|a 019391959
|2 Uk
|
019 |
|
|
|a 1099833486
|a 1122892406
|
020 |
|
|
|a 9781119618393
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 1119618398
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 9781119618379
|q (electronic bk.)
|
020 |
|
|
|a 1119618371
|q (electronic bk.)
|
020 |
|
|
|a 9781119618386
|
020 |
|
|
|a 111961838X
|
020 |
|
|
|z 9781786304483
|q (print)
|
020 |
|
|
|z 1786304481
|
024 |
7 |
|
|a 10.1002/9781119618393
|2 doi
|
029 |
1 |
|
|a AU@
|b 000065306451
|
029 |
1 |
|
|a CHNEW
|b 001050929
|
029 |
1 |
|
|a CHVBK
|b 567422828
|
029 |
1 |
|
|a UKMGB
|b 019391959
|
035 |
|
|
|a (OCoLC)1099525672
|z (OCoLC)1099833486
|z (OCoLC)1122892406
|
037 |
|
|
|a 9781119618386
|b Wiley
|
037 |
|
|
|a 9820849
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|b C93 2019eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cyber-vigilance and digital trust :
|b cyber security in the era of cloud computing and IoT /
|c edited by Wiem Tounsi.
|
264 |
|
1 |
|a London, UK :
|b ISTE, Ltd. ;
|a Hoboken, NJ :
|b John Wiley & Sons, Inc.,
|c 2019.
|
300 |
|
|
|a 1 online resource (x, 230 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Networks and telecommunications series
|
505 |
0 |
|
|a What is Cyber Threat Intelligence and How is it Evolving? / Wiem Tounsi -- Trust Management Systems: a Retrospective Study on Digital Trust / Reda Yaich -- Risk Analysis Linked to Network Attacks / Kamel Karoui -- Analytical Overview on Secure Information Flow in Android Systems: Protecting Private Data Used by Smartphone Applications / Mariem Graa.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (John Wiley, viewed April 30, 2019).
|
520 |
|
|
|a Reviewing recent advances in cyber threat intelligence, trust management and risk analysis, this book gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems. --
|c Edited summary from book.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Internet of things
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet des objets
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Tounsi, Wiem,
|e editor.
|
758 |
|
|
|i has work:
|a Cyber-vigilance and digital trust (Text)
|1 https://id.oclc.org/worldcat/entity/E39PD349hfXPgHWvrVWRtGTKRq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Cyber-vigilance and digital trust.
|d London, UK : ISTE, Ltd. ; Hoboken, NJ : John Wiley & Sons, Inc., 2019
|z 1786304481
|z 9781786304483
|w (OCoLC)1090756502
|
830 |
|
0 |
|a Networks and telecommunications series.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5763061
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36227886
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36227291
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5763061
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2112958
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300505335
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16199477
|
994 |
|
|
|a 92
|b IZTAP
|