Security in computing:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, N.J.
Prentice Hall
2003
|
Ausgabe: | 3. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXIX, 746 S. Ill., graph. Darst. |
ISBN: | 0130355488 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV014781518 | ||
003 | DE-604 | ||
005 | 20060703 | ||
007 | t | ||
008 | 021002s2003 xxuad|| |||| 00||| eng d | ||
010 | |a 2002034368 | ||
020 | |a 0130355488 |9 0-13-035548-8 | ||
035 | |a (OCoLC)50676236 | ||
035 | |a (DE-599)BVBBV014781518 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 |a DE-92 |a DE-91G |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
100 | 1 | |a Pfleeger, Charles P. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security in computing |c Charles P. Pfleeger ; Shari Lawrence Pfleeger |
250 | |a 3. ed. | ||
264 | 1 | |a Upper Saddle River, N.J. |b Prentice Hall |c 2003 | |
300 | |a XXIX, 746 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Privacy, Right of | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Pfleeger, Shari Lawrence |e Sonstige |0 (DE-588)133086836 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UBRegensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010006196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010006196 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804129562136674304 |
---|---|
adam_text | Contents
Foreword xix
Preface to the Third Edition xxv
Chapter
1.1
Protecting Valuables
Characteristics of Computer Intrusion
1.2
Threats, Vulnerabilities, and Controls
Method, Opportunity, and Motive
1.3
Security Goals
Vulnerabilities
1.4
Amateurs
Crackers
Career Criminals
1.5
Controls
Effectiveness of Controls
1.6
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7
vii
viii Contents
1.8
1.9
1.10
1.11
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
Terms and Concepts
30
Where the Field Is Headed
31
To Learn More
31
Exercises
32
itary Cryptography
35
Terminology and Background
36
Terminology
36
Representing Characters
40
Substitution Ciphers
41
The Caesar Cipher
41
Other Substitutions
44
One-Time Pads
47
Summary of Substitutions
52
Transpositions (Permutations)
52
Columnar Transpositions
52
Combinations of Approaches
55
Making Good Encryption Algorithms
55
What Makes a Secure Encryption Algorithm?
56
Symmetric and Asymmetric Encryption Systems
59
Stream and Block Ciphers
60
Confusion and Diffusion
62
Cryptanalysis
62
The Data Encryption Standard
65
Background and History
65
Overview of the
67
Double and Triple
67
Security of the
69
The AES Encryption Algorithm
69
The AES Contest
69
Overview of Rijndael
70
Strength of the Algorithm
70
Comparison of
71
Public Key Encryption
73
Motivation
73
Characteristics
73
Rivest-Shamir-Adeiman (RSA) Encryption
75
The Uses of Encryption
76
Cryptographic Hash Functions
76
Key Exchange
Digital Signatures
Certificates
2.9
Summary of Encryption
2.10
Terms and Concepts
2.11
Where the Field Is Headed
2.12
To Learn More
2.13
Exercises
Contents ix
77
79
81
88
89
90
90
91
Chapter
3.1
Fixing Faults
Unexpected Behavior
Types of Flaws
3.2
Buffer Overflows
Incomplete Mediation
Time-of-Check to Time-of-Use Errors
Combinations of Nonmalicious Program Flaws
3.3
Why Worry About Malicious Code?
Kinds of Malicious Code
How Viruses Attach
Document Viruses
How Viruses Gain Control
Homes for Viruses
Virus Signatures
The Source of Viruses
Prevention of Virus Infection
Truths and Misconceptions About Viruses
First Example of Malicious Code: The Brain Virus
Another Example: The Internet Worm
More Malicious Code: Code Red
Malicious Code on the Web: Web Bugs
3.4
Trapdoors
Salami Attacks
Covert Channels: Programs That Leak Information
3.5
Contents
Chapter
Developmental Controls
151
Operating System Controls on Use of Programs
169
Administrative Controls
171
Program Controls in General
172
3.6
Summary of Program Threats and Controls
172
3.7
Terms and Concepts
173
3.8
Where the Field Is Headed
174
3.9
To Learn More
175
3.10
Exercises
176
Protection in General-Purpose Operating Systems
179
4.1
Protected Objects and Methods of Protection
180
A Bit of History
180
Protected Objects
180
Security Methods of Operating Systems
181
4.2
Memory and Address Protection
183
Fence
183
Relocation
184
Base/Bounds Registers
185
Tagged Architecture
187
Segmentation
189
Paging
192
Combined Paging with Segmentation
194
4.3
Control of Access to General Objects
194
Directory
796
Access Control List
198
Access Control Matrix
201
Capability
201
Procedure-Oriented Access Control
204
4.4
File Protection Mechanisms
204
Basic Forms of Protection
205
Single Permissions
207
Per-Object and Per-User Protection
208
4.5
User Authentication
209
Use of Passwords
209
Attacks on Passwords
212
Password Selection Criteria
218
The Authentication Process
221
Authentication Other Than Passwords
223
Contents
XI
4.6
Summary of Security for Users
223
4.7
Terms and Concepts
224
4.8
Where the Field Is Headed
225
4.9
To Learn More
226
4.10
Exercises
226
Chapter
5.1
What Is a Trusted System?
230
5.2
Security Policies
232
Military Security Policy
232
Commercial Security Policies
235
5.3
Models of Security
238
Multilevel Security
239
Models Proving Theoretical Limitations
of Security Systems
244
Summary of Models of Protection Systems
250
5.4
Trusted Operating System Design
250
Trusted System Design Elements
251
Security Features of Ordinary Operating Systems
253
Security Features of Trusted Operating Systems
254
Kernelized Design
259
Separation/Isolation
265
Visualization
266
Layered Design
269
5.5
Assurance in Trusted Operating Systems
273
Typical Operating System Flaws
274
Assurance Methods
276
Open Source
281
Evaluation
282
5.6
Implementation Examples
297
General-Purpose Operating Systems
298
Operating Systems Designed for Security
300
5.7
Summary of Security in Operating Systems
302
5.8
Terms and Concepts
303
5.9
Where the Field Is Headed
305
5.10
To Learn More
305
5.11
Exercises
305
xii Contents
Chapter
6.1
Concept of a Database
Components of Databases
Advantages of Using Databases
6.2
Integrity of the Database
Element Integrity
Auditability
Access Control
User Authentication
Availability
Integrity/Confidentiality/Availability
6.3
Protection Features from the Operating System
Two-Phase Update
Redundancy/Internal Consistency
Recovery
Concurrency/Consistency
Monitors
Summary of Data Reliability
6.4
Access Decisions
Types of Disclosures
Security versus Precision
6.5
Direct Attack
Indirect Attack
Aggregation
6.6
The Case for Differentiated Security
Granularity
Security Issues
6.7
Separation
Designs of Multilevel Secure Databases
Concluding Remarks
6.8
Contents
XIII
6.9
Terms and Concepts
358
6.10
Where the Field Is Headed
358
6.11
To Learn More
359
6.12
Exercises
359
Chapter
7.1
The Network
Media
Protocols
Types of Networks
Topologies
Distributed Systems
APIs
Advantages of Computing Networks
7.2
What Makes a Network Vulnerable?
Who Attacks Networks?
Threat Precursors
Threats in Transit: Eavesdropping and Wiretapping
Protocol Flaws
Impersonation
Spoofing
Message Confidentiality Threats
Message Integrity Threats
Web Site Defacement
Denial of Service
Distributed Denial of Service
Threats to Active or Mobile Code
Complex Attacks
Summary of Network Vulnerabilities
7.3
Security Threat Analysis
Design and Implementation
Architecture
Encryption
Content Integrity
Strong Authentication
xiv Contents
Access Controls
Alarms and Alerts
Honeypots
Traffic Flow Security
Controls Review
7.4
What Is a Firewall?
Design of Firewalls
Types of Firewalls
Personal Firewalls
Comparison of Firewall Types
Example Firewall Configurations
What Firewalls Can
7.5
Types of IDSs
Goals for Intrusion Detection Systems
IDS Strengths and Limitations
7.6
Security for E-Mail
Designs
Example Secure E-Mail Systems
7.7
7.8
7.9
7.10
7.11
Chapter
8.1
Contents of a Security Plan
Security Planning Team Members
Assuring Commitment to a Security Plan
Business Continuity Plans
Incident Response Plans
8.2
The Nature of Risk
Steps of a Risk Analysis
Arguments For and Against Risk Analysis
Chapter
Contents
XV
8.3
Organizational Security Policies
529
Purpose
529
Audience
529
Contents
531
Characteristics of a Good Security Policy
532
Examples
533
Policy Issue Example: Government E-Mail
535
8.4
Physical Security
538
Natural Disasters
538
Power Loss
540
Human Vandals
541
Interception of Sensitive Information
543
Contingency Planning
545
Physical Security Recap
548
8.5
Summary
548
8.6
Terms and Concepts
549
8.7
To Learn More
550
8.8
Exercises
551
Legal,
Privacy, and Ethical Issues in Computer Security
553
9.1
Protecting Programs and Data
555
Copyrights
556
Patents
561
Trade Secrets
564
Protection for Computer Objects
565
9.2
Information and the Law
568
Information as an Object
568
Legal Issues Relating to Information
570
Protecting Information
572
Summary of Protection for Computer Artifacts
574
9.3
Rights of Employees and Employers
575
Ownership of Products
575
9.4
Software Failures
578
Selling Correct Software
579
Reporting Software Flaws
580
9.5
Computer Crime
583
Why a Separate Category for Computer Crime Is Needed
583
Why Computer Crime Is Hard to Define
586
xvi Contents
Why Computer Crime Is Hard to Prosecute
Examples of Statutes
International Dimensions
Why Computer Criminals Are Hard to Catch
What Computer Crime Does Not Address
Cryptography and the Law
Summary of Legal Issues in Computer Security
9.6
Threats to Privacy
Controls Protecting Privacy
9.7
Differences Between the Law and Ethics
Studying Ethics
Ethical Reasoning
9.8
Case I: Use of Computer Services
Case II: Privacy Rights
Case III: Denial of Service
Case IV: Ownership of Programs
Case V: Proprietary Resources
Case VI: Fraud
Case
Case VIII: Ethics of Hacking or Cracking
Codes of Ethics
Conclusion of Computer Ethics
9.9
9.10
9.11
Chapter
10.1
Complexity
Properties of Arithmetic
10.2
Fundamental Concepts
Data Encryption Standard
Advanced Encryption Standard (AES)
10.3
10.4
Contents
XVII
Public Key
666
Characteristics
666
Merkle-Hellman
667
Rivest-Shamir-Adelman
678
El Gamal and Digital
682
Quantum
683
Quantum
683
Photon
684
Cryptography with Photons
684
Implementation
686
Summary of Encryption
686
Terms and Concepts
687
Where the Field Is Headed
688
To Learn More
688
Exercises
688
10.5
10.6
10.7
10.8
10.9
Bibliography
Index
|
any_adam_object | 1 |
author | Pfleeger, Charles P. |
author_GND | (DE-588)133086836 |
author_facet | Pfleeger, Charles P. |
author_role | aut |
author_sort | Pfleeger, Charles P. |
author_variant | c p p cp cpp |
building | Verbundindex |
bvnumber | BV014781518 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)50676236 (DE-599)BVBBV014781518 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 3. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02072nam a2200541zc 4500</leader><controlfield tag="001">BV014781518</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060703 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">021002s2003 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2002034368</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0130355488</subfield><subfield code="9">0-13-035548-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)50676236</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014781518</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pfleeger, Charles P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in computing</subfield><subfield code="c">Charles P. Pfleeger ; Shari Lawrence Pfleeger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 746 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pfleeger, Shari Lawrence</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)133086836</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UBRegensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010006196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010006196</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV014781518 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:07:06Z |
institution | BVB |
isbn | 0130355488 |
language | English |
lccn | 2002034368 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010006196 |
oclc_num | 50676236 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-92 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-355 DE-BY-UBR DE-92 DE-91G DE-BY-TUM DE-83 |
physical | XXIX, 746 S. Ill., graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Prentice Hall |
record_format | marc |
spelling | Pfleeger, Charles P. Verfasser aut Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger 3. ed. Upper Saddle River, N.J. Prentice Hall 2003 XXIX, 746 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computerbeveiliging gtt Computer security Data protection Privacy, Right of Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Pfleeger, Shari Lawrence Sonstige (DE-588)133086836 oth Digitalisierung UBRegensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010006196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Pfleeger, Charles P. Security in computing Computerbeveiliging gtt Computer security Data protection Privacy, Right of Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4011134-9 (DE-588)4011144-1 |
title | Security in computing |
title_auth | Security in computing |
title_exact_search | Security in computing |
title_full | Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger |
title_fullStr | Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger |
title_full_unstemmed | Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger |
title_short | Security in computing |
title_sort | security in computing |
topic | Computerbeveiliging gtt Computer security Data protection Privacy, Right of Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computerbeveiliging Computer security Data protection Privacy, Right of Rechnernetz Computersicherheit Datenschutz Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010006196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pfleegercharlesp securityincomputing AT pfleegersharilawrence securityincomputing |