Security in computing:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ
Prentice Hall
2006
|
Ausgabe: | 4. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXIX, 845 S. graph. Darst. 25 cm |
ISBN: | 0132390779 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022189275 | ||
003 | DE-604 | ||
005 | 20190116 | ||
007 | t | ||
008 | 061211s2006 xxud||| |||| 00||| eng d | ||
010 | |a 2006026798 | ||
020 | |a 0132390779 |9 0-13-239077-9 | ||
035 | |a (OCoLC)316118133 | ||
035 | |a (DE-599)BVBBV022189275 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 |a DE-92 |a DE-522 |a DE-210 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Pfleeger, Charles P. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security in computing |c Charles P. Pfleeger ; Shari Lawrence Pfleeger |
250 | |a 4. ed. | ||
264 | 1 | |a Upper Saddle River, NJ |b Prentice Hall |c 2006 | |
300 | |a XXIX, 845 S. |b graph. Darst. |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Privacy, Right of | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Pfleeger, Shari Lawrence |e Sonstige |0 (DE-588)133086836 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015083255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015083255 |
Datensatz im Suchindex
_version_ | 1804135804848570368 |
---|---|
adam_text | Contents
Foreword
Preface
Chapter
1.1
Protecting Valuables
Characteristics of Computer Intrusion
1.2
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3
Security Goals
Vulnerabilities
1.4
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5
Controls
Effectiveness of Controls
1.6
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7
1.8
1.9
1.10
1.11
Chapter
2.1
Terminology
Representing Characters
2.2
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3
Columnar Transpositions
Combinations of Approaches
2.4
What Makes a Secure Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanalysis
2.5
Background and History
Overview of the
Double and Triple
Security of the
2.6
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of
2.7
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
Chapter
2.8
The Uses of Encryption
79
Cryptographic Hash Functions
79
Key Exchange
80
Digital Signatures
82
Certificates
84
2.9
Summary of Encryption
91
2.10
Terms and Concepts
92
2.11
Where the Field Is Headed
93
2.12
To Learn More
94
2.13
Exercises
94
Program Security
98
3.1
Secure Programs
99
Fixing Faults
99
Unexpected Behavior
101
Types of Flaws
103
3.2
Nonmalicious Program Errors
103
Buffer Overflows
704
Incomplete Mediation
107
Time-of-Check to Time-of-Use Errors
109
Combinations of Nonmalicious Program Flaws
111
3.3
Viruses and Other Malicious Code
111
Why Worry About Malicious Code?
113
Kinds of Malicious Code
114
How Viruses Attach
117
Document Viruses
119
How Viruses Gain Control
120
Homes for Viruses
121
Virus Signatures
124
The Source of Viruses
128
Prevention of Virus Infection
129
Truths and Misconceptions About Viruses
131
First Example of Malicious Code: The Brain Virus
133
Example: The Internet Worm
134
More Malicious Code: Code Red
137
Malicious Code on the Web: Web Bugs
139
3.4
Targeted Malicious Code
141
Trapdoors
141
Salami Attack
144
Rootkits and the SonyXCP
Privilege Escalation
Interface Illusions
Keystroke Logging
Man-in-the-Middle Attacks
Timing Attacks
Covert Channels: Programs That Leak Information
3.5
Developmental Controls
Program Controls in General
3.6
3.7
3.8
3.9
3.10
Chapter
4.1
A Bit of History
Protected Objects
Security Methods of Operating Systems
4.2
Fence
Relocation
Base/Bounds Registers
Tagged Architecture
Segmentation
Paging
Combined Paging with Segmentation
4.3
Directory
Access Control List
Access Control Matrix
Capability
Kerberos
Procedure-Oriented Access Control
Role-Based Access Control
4.4
Chapter
Contents
ix
Basic Forms of Protection
215
Individual Permissions
217
Per-Object and Per-User Protection
219
4.5
User Authentication
219
Passwords as Authenticators
221
Additional Authentication Information
221
Attacks on Passwords
221
Password Selection Criteria
229
The Authentication Process
232
Biometrics: Authentication Not Using Passwords
234
4.6
Summary of Security for Users
236
4.7
Terms and Concepts
237
4.8
Where the Field Is Headed
238
4.9
To Learn More
239
4.10
Exercises
239
Designing Trusted Operating Systems
242
5.1
What Is a Trusted System?
243
5.2
Security Policies
245
Military Security Policy
246
Commercial Security Policies
248
5.3
Models of Security
252
Multilevel Security
253
Models Proving Theoretical Limitations of Security Systems
257
Summary of Models of Protection Systems
263
5.4
Trusted Operating System Design
264
Trusted System Design Elements
265
Security Features of Ordinary Operating Systems
268
Security Features of Trusted Operating Systems
268
Kernellzed Design
274
Separation/Isolation
279
Visualization
280
Layered Design
283
5.5
Assurance in Trusted Operating Systems
287
Typical Operating System Flaws
288
Assurance Methods
290
Open Source
295
Evaluation
296
5.6
5.7
5.8
5.9
5.10
Chapter
6.1
Concept of a Database
Components of Databases
Advantages of Using Databases
6.2
Integrity of the Database
Element Integrity
Auditability
Access Control
User Authentication
Availability
Integrity/Confidentiality/Availability
6.3
Protection Features from the Operating System
Two-Phase Update
Redundancy/Internal Consistency
Recovery
Concurrency/Consistency
Monitors
Summary of Data Reliability
6.4
Access Decisions
Types of Disclosures
Security versus Precision
6.5
Direct Attack
Indirect Attack
Aggregation
6.6
ГЛе
Granularity
Security Issues
6.7
Separation
Designs of Multilevel Secure Databases
Trusted Front End
Practical issues
6.8
Privacy and Sensitivity
Data Correctness and Integrity
Availability of Data
6.9
6.10
6.11
6.12
6.13
Chapter
7.1
The Network
Media
Protocols
Types of Networks
7.2
What Makes a Network Vulnerable
Who Attacks Networks?
Reconnaissance
Threats in Transit: Eavesdropping and Wiretapping
Summary of Wiretapping
Protocol Flaws
Impersonation
Message Confidentiality Threats
Message Integrity Threats
Format Failures
Web Site Vulnerabilities
Denial of Service
Distributed Denial of Service
Threats in Active or Mobile Code
Complex Attacks
Summary of Network Vulnerabilities
7.3 Network
Security Threat Analysis
Design and Implementation
Architecture
Encryption
Content Integrity
Strong Authentication
Access Controls
Wireless Security
Alarms and Alerts
Honeypots
Traffic Flow Security
Controls Review
7.4
What Is a Firewall?
Design of Firewalls
Types of Firewalls
Personal Firewalls
Comparison of Firewall Types
Example Firewall Configurations
7.5
Types of IDSs
Goals for Intrusion Detection Systems
IDS Strengths and Limitations
7.6
Security for E-mail
Requirements and Solutions
Designs
Example Secure E-mail Systems
7.7
7.8
7.9
7.10
7.11
Chapter
8.1
Contents of a Security Plan
Security Planning Team Members
Chapter
Contents
XIII
Assuring Commitment to a Security Plan
517
Business Continuity Plans
518
Incident Response Plans
521
8.2
Risk Analysis
524
The Nature of Risk
525
Steps of a Risk Analysis
525
Arguments For and Against Risk Analysis
544
8.3
Organizational Security Policies
547
Purpose
547
Audience
547
Contents
548
Characteristics of a Good Security Policy
549
Durability
550
Examples
550
Policy Issue Example: Government E-mail
553
8.4
Physical Security
556
Natural Disasters
556
Power Loss
558
Surge Suppressor
558
Human Vandals
559
Interception of Sensitive Information
561
Contingency Planning
563
Physical Security Recap
566
8.5
Summary
566
8.6
Terms and Concepts
567
8.7
To Learn More
568
8.8
Exercises
569
The
Economics of Cybersecurity
571
9.1
Making a Business Case
572
Determining Economic Value
574
9.2
Quantifying Security
578
The Economic Impact of Cybersecurity
580
Data to Justify Security Action
580
Are the Data Representative?
586
Sources of Attack
588
Financial Impact
588
Conclusion
588
xiv
9.3
Transferring Models
Models for Decision-Making
The Role of Organizational Culture
9.4
Economics and Privacy
Economics and Integrity
Economics and Regulation
9.5
9.6
9.7
9.8
Chapter
10.1
Aspects of Information Privacy
Computer-Related Privacy Problems
10.2
Fair Information Policies
U.S. Privacy Laws
Controls on U.S. Government Web Sites
Controls on Commercial Web Sites
Non-U.S. Privacy Principles
Anonymity, Multiple Identities
Government and Privacy
Identity Then
10.3
What Authentication Means
Conclusions
10.4
Government Data Mining
Privacy-Preserving Data Mining
10.5
Understanding the Online Environment
Payments on the Web
Site and Portal Registrations
Whose Page Is This?
Precautions for Web Surfing
Chapter
Contents
XV
Spyware
632
Shopping on the Internet
634
10.6
E-mail Security
635
Where Does E-mail Go, and Who Can Access It?
636
Interception of E-mail
636
Monitoring E-mail
637
Anonymous E-mail and Remailers
637
Spoofing and
638
Summary
638
10.7
Impacts on Emerging Technologies
638
RFID
639
Electronic Voting
641
VoIP and Skype
642
Conclusions on Emerging Technologies
643
10.8
Summary
643
10.9
Terms and Concepts
643
10.10
Where the Field Is Headed
645
10.11
To Learn More
645
10.12
Exercises
646
Legal
and Ethical Issues in Computer Security
647
11.1
Protecting Programs and Data
649
Copyrights
649
Patents
655
Trade Secrets
658
Protection for Computer Objects
659
11.2
Information and the Law
663
Information as an Object
663
Legal Issues Relating to Information
665
Protecting Information
667
Summary of Protection for Computer Artifacts
669
11.3
Rights of Employees and Employers
670
Ownership of
670
11.4
Redress for Software Failures
673
Selling Correct Software
673
Reporting Software Flaws
675
11.5
Computer Crime
679
Why a Separate Category for Computer Crime Is Needed
679
xvi Contents
Why
Why Computer Crime Is Hard to Prosecute
Examples of Statutes
International Dimensions
Why Computer Criminals Are Hard to Catch
What Computer Crime Does Not Address
Cryptography and the Law
Summary of Legal Issues in Computer Security
11.6
Differences Between the Law and Ethics
Studying Ethics
Ethical Reasoning
11.7
Case I: Use of Computer Services
Case II: Privacy Rights
Case III: Denial of Service
Case IV: Ownership of Programs
Case V: Proprietary Resources
Case VI: Fraud
Case
Case
Codes of Ethics
Conclusion of Computer Ethics
11.8
11.9
11.10
Chapter
12.1
Complexity
Properties of Arithmetic
12.2
Fundamental Concepts
Data Encryption Standard
Advanced Encryption Standard
RC2,RC4andRC5
Cryptographic Challenges
Contents xvii
12.3 Public Key
Characteristics
Merkle-Hellman
Rivest-Shamir-Adelman (RSA)
El Gamal and Digital
12.4 Quantum
Quantum
Photon
Cryptography with Photons
Implementation
12.5
12.6
12.7
12.8
12.9
Bibliography
Index
|
adam_txt |
Contents
Foreword
Preface
Chapter
1.1
Protecting Valuables
Characteristics of Computer Intrusion
1.2
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3
Security Goals
Vulnerabilities
1.4
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5
Controls
Effectiveness of Controls
1.6
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7
1.8
1.9
1.10
1.11
Chapter
2.1
Terminology
Representing Characters
2.2
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3
Columnar Transpositions
Combinations of Approaches
2.4
What Makes a "Secure" Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanalysis
2.5
Background and History
Overview of the
Double and Triple
Security of the
2.6
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of
2.7
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
Chapter
2.8
The Uses of Encryption
79
Cryptographic Hash Functions
79
Key Exchange
80
Digital Signatures
82
Certificates
84
2.9
Summary of Encryption
91
2.10
Terms and Concepts
92
2.11
Where the Field Is Headed
93
2.12
To Learn More
94
2.13
Exercises
94
Program Security
98
3.1
Secure Programs
99
Fixing Faults
99
Unexpected Behavior
101
Types of Flaws
103
3.2
Nonmalicious Program Errors
103
Buffer Overflows
704
Incomplete Mediation
107
Time-of-Check to Time-of-Use Errors
109
Combinations of Nonmalicious Program Flaws
111
3.3
Viruses and Other Malicious Code
111
Why Worry About Malicious Code?
113
Kinds of Malicious Code
114
How Viruses Attach
117
Document Viruses
119
How Viruses Gain Control
120
Homes for Viruses
121
Virus Signatures
124
The Source of Viruses
128
Prevention of Virus Infection
129
Truths and Misconceptions About Viruses
131
First Example of Malicious Code: The Brain Virus
133
Example: The Internet Worm
134
More Malicious Code: Code Red
137
Malicious Code on the Web: Web Bugs
139
3.4
Targeted Malicious Code
141
Trapdoors
141
Salami Attack
144
Rootkits and the SonyXCP
Privilege Escalation
Interface Illusions
Keystroke Logging
Man-in-the-Middle Attacks
Timing Attacks
Covert Channels: Programs That Leak Information
3.5
Developmental Controls
Program Controls in General
3.6
3.7
3.8
3.9
3.10
Chapter
4.1
A Bit of History
Protected Objects
Security Methods of Operating Systems
4.2
Fence
Relocation
Base/Bounds Registers
Tagged Architecture
Segmentation
Paging
Combined Paging with Segmentation
4.3
Directory
Access Control List
Access Control Matrix
Capability
Kerberos
Procedure-Oriented Access Control
Role-Based Access Control
4.4
Chapter
Contents
ix
Basic Forms of Protection
215
Individual Permissions
217
Per-Object and Per-User Protection
219
4.5
User Authentication
219
Passwords as Authenticators
221
Additional Authentication Information
221
Attacks on Passwords
221
Password Selection Criteria
229
The Authentication Process
232
Biometrics: Authentication Not Using Passwords
234
4.6
Summary of Security for Users
236
4.7
Terms and Concepts
237
4.8
Where the Field Is Headed
238
4.9
To Learn More
239
4.10
Exercises
239
Designing Trusted Operating Systems
242
5.1
What Is a Trusted System?
243
5.2
Security Policies
245
Military Security Policy
246
Commercial Security Policies
248
5.3
Models of Security
252
Multilevel Security
253
Models Proving Theoretical Limitations of Security Systems
257
Summary of Models of Protection Systems
263
5.4
Trusted Operating System Design
264
Trusted System Design Elements
265
Security Features of Ordinary Operating Systems
268
Security Features of Trusted Operating Systems
268
Kernellzed Design
274
Separation/Isolation
279
Visualization
280
Layered Design
283
5.5
Assurance in Trusted Operating Systems
287
Typical Operating System Flaws
288
Assurance Methods
290
Open Source
295
Evaluation
296
5.6
5.7
5.8
5.9
5.10
Chapter
6.1
Concept of a Database
Components of Databases
Advantages of Using Databases
6.2
Integrity of the Database
Element Integrity
Auditability
Access Control
User Authentication
Availability
Integrity/Confidentiality/Availability
6.3
Protection Features from the Operating System
Two-Phase Update
Redundancy/Internal Consistency
Recovery
Concurrency/Consistency
Monitors
Summary of Data Reliability
6.4
Access Decisions
Types of Disclosures
Security versus Precision
6.5
Direct Attack
Indirect Attack
Aggregation
6.6
ГЛе
Granularity
Security Issues
6.7
Separation
Designs of Multilevel Secure Databases
Trusted Front End
Practical issues
6.8
Privacy and Sensitivity
Data Correctness and Integrity
Availability of Data
6.9
6.10
6.11
6.12
6.13
Chapter
7.1
The Network
Media
Protocols
Types of Networks
7.2
What Makes a Network Vulnerable
Who Attacks Networks?
Reconnaissance
Threats in Transit: Eavesdropping and Wiretapping
Summary of Wiretapping
Protocol Flaws
Impersonation
Message Confidentiality Threats
Message Integrity Threats
Format Failures
Web Site Vulnerabilities
Denial of Service
Distributed Denial of Service
Threats in Active or Mobile Code
Complex Attacks
Summary of Network Vulnerabilities
7.3 Network
Security Threat Analysis
Design and Implementation
Architecture
Encryption
Content Integrity
Strong Authentication
Access Controls
Wireless Security
Alarms and Alerts
Honeypots
Traffic Flow Security
Controls Review
7.4
What Is a Firewall?
Design of Firewalls
Types of Firewalls
Personal Firewalls
Comparison of Firewall Types
Example Firewall Configurations
7.5
Types of IDSs
Goals for Intrusion Detection Systems
IDS Strengths and Limitations
7.6
Security for E-mail
Requirements and Solutions
Designs
Example Secure E-mail Systems
7.7
7.8
7.9
7.10
7.11
Chapter
8.1
Contents of a Security Plan
Security Planning Team Members
Chapter
Contents
XIII
Assuring Commitment to a Security Plan
517
Business Continuity Plans
518
Incident Response Plans
521
8.2
Risk Analysis
524
The Nature of Risk
525
Steps of a Risk Analysis
525
Arguments For and Against Risk Analysis
544
8.3
Organizational Security Policies
547
Purpose
547
Audience
547
Contents
548
Characteristics of a Good Security Policy
549
Durability
550
Examples
550
Policy Issue Example: Government E-mail
553
8.4
Physical Security
556
Natural Disasters
556
Power Loss
558
Surge Suppressor
558
Human Vandals
559
Interception of Sensitive Information
561
Contingency Planning
563
Physical Security Recap
566
8.5
Summary
566
8.6
Terms and Concepts
567
8.7
To Learn More
568
8.8
Exercises
569
The
Economics of Cybersecurity
571
9.1
Making a Business Case
572
Determining Economic Value
574
9.2
Quantifying Security
578
The Economic Impact of Cybersecurity
580
Data to Justify Security Action
580
Are the Data Representative?
586
Sources of Attack
588
Financial Impact
588
Conclusion
588
xiv
9.3
Transferring Models
Models for Decision-Making
The Role of Organizational Culture
9.4
Economics and Privacy
Economics and Integrity
Economics and Regulation
9.5
9.6
9.7
9.8
Chapter
10.1
Aspects of Information Privacy
Computer-Related Privacy Problems
10.2
Fair Information Policies
U.S. Privacy Laws
Controls on U.S. Government Web Sites
Controls on Commercial Web Sites
Non-U.S. Privacy Principles
Anonymity, Multiple Identities
Government and Privacy
Identity Then
10.3
What Authentication Means
Conclusions
10.4
Government Data Mining
Privacy-Preserving Data Mining
10.5
Understanding the Online Environment
Payments on the Web
Site and Portal Registrations
Whose Page Is This?
Precautions for Web Surfing
Chapter
Contents
XV
Spyware
632
Shopping on the Internet
634
10.6
E-mail Security
635
Where Does E-mail Go, and Who Can Access It?
636
Interception of E-mail
636
Monitoring E-mail
637
Anonymous E-mail and Remailers
637
Spoofing and
638
Summary
638
10.7
Impacts on Emerging Technologies
638
RFID
639
Electronic Voting
641
VoIP and Skype
642
Conclusions on Emerging Technologies
643
10.8
Summary
643
10.9
Terms and Concepts
643
10.10
Where the Field Is Headed
645
10.11
To Learn More
645
10.12
Exercises
646
Legal
and Ethical Issues in Computer Security
647
11.1
Protecting Programs and Data
649
Copyrights
649
Patents
655
Trade Secrets
658
Protection for Computer Objects
659
11.2
Information and the Law
663
Information as an Object
663
Legal Issues Relating to Information
665
Protecting Information
667
Summary of Protection for Computer Artifacts
669
11.3
Rights of Employees and Employers
670
Ownership of
670
11.4
Redress for Software Failures
673
Selling Correct Software
673
Reporting Software Flaws
675
11.5
Computer Crime
679
Why a Separate Category for Computer Crime Is Needed
679
xvi Contents
Why
Why Computer Crime Is Hard to Prosecute
Examples of Statutes
International Dimensions
Why Computer Criminals Are Hard to Catch
What Computer Crime Does Not Address
Cryptography and the Law
Summary of Legal Issues in Computer Security
11.6
Differences Between the Law and Ethics
Studying Ethics
Ethical Reasoning
11.7
Case I: Use of Computer Services
Case II: Privacy Rights
Case III: Denial of Service
Case IV: Ownership of Programs
Case V: Proprietary Resources
Case VI: Fraud
Case
Case
Codes of Ethics
Conclusion of Computer Ethics
11.8
11.9
11.10
Chapter
12.1
Complexity
Properties of Arithmetic
12.2
Fundamental Concepts
Data Encryption Standard
Advanced Encryption Standard
RC2,RC4andRC5
Cryptographic Challenges
Contents xvii
12.3 Public Key
Characteristics
Merkle-Hellman
Rivest-Shamir-Adelman (RSA)
El Gamal and Digital
12.4 Quantum
Quantum
Photon
Cryptography with Photons
Implementation
12.5
12.6
12.7
12.8
12.9
Bibliography
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Pfleeger, Charles P. |
author_GND | (DE-588)133086836 |
author_facet | Pfleeger, Charles P. |
author_role | aut |
author_sort | Pfleeger, Charles P. |
author_variant | c p p cp cpp |
building | Verbundindex |
bvnumber | BV022189275 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)316118133 (DE-599)BVBBV022189275 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 4. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01858nam a2200493zc 4500</leader><controlfield tag="001">BV022189275</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190116 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">061211s2006 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006026798</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0132390779</subfield><subfield code="9">0-13-239077-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)316118133</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022189275</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-210</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pfleeger, Charles P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in computing</subfield><subfield code="c">Charles P. Pfleeger ; Shari Lawrence Pfleeger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 845 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pfleeger, Shari Lawrence</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)133086836</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015083255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015083255</subfield></datafield></record></collection> |
id | DE-604.BV022189275 |
illustrated | Illustrated |
index_date | 2024-07-02T16:03:13Z |
indexdate | 2024-07-09T20:46:20Z |
institution | BVB |
isbn | 0132390779 |
language | English |
lccn | 2006026798 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015083255 |
oclc_num | 316118133 |
open_access_boolean | |
owner | DE-739 DE-92 DE-522 DE-210 |
owner_facet | DE-739 DE-92 DE-522 DE-210 |
physical | XXIX, 845 S. graph. Darst. 25 cm |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Prentice Hall |
record_format | marc |
spelling | Pfleeger, Charles P. Verfasser aut Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger 4. ed. Upper Saddle River, NJ Prentice Hall 2006 XXIX, 845 S. graph. Darst. 25 cm txt rdacontent n rdamedia nc rdacarrier Computer security Data protection Privacy, Right of Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s Datensicherung (DE-588)4011144-1 s DE-604 Pfleeger, Shari Lawrence Sonstige (DE-588)133086836 oth Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015083255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Pfleeger, Charles P. Security in computing Computer security Data protection Privacy, Right of Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4011144-1 (DE-588)4011134-9 |
title | Security in computing |
title_auth | Security in computing |
title_exact_search | Security in computing |
title_exact_search_txtP | Security in computing |
title_full | Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger |
title_fullStr | Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger |
title_full_unstemmed | Security in computing Charles P. Pfleeger ; Shari Lawrence Pfleeger |
title_short | Security in computing |
title_sort | security in computing |
topic | Computer security Data protection Privacy, Right of Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Computer security Data protection Privacy, Right of Computersicherheit Rechnernetz Datensicherung Datenschutz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015083255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pfleegercharlesp securityincomputing AT pfleegersharilawrence securityincomputing |