Computer system security: basic concepts and solved exercises
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[Lausanne]
EPFL Press [u.a.]
2007
|
Ausgabe: | 1. ed. |
Schriftenreihe: | Computer and communication sciences
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 260 S. graph. Darst. |
ISBN: | 9781420046205 9782940222148 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022466126 | ||
003 | DE-604 | ||
005 | 20210319 | ||
007 | t | ||
008 | 070615s2007 d||| |||| 00||| eng d | ||
020 | |a 9781420046205 |9 978-1-4200-4620-5 | ||
020 | |a 9782940222148 |9 978-2-940222-14-8 | ||
035 | |a (OCoLC)74968237 | ||
035 | |a (DE-599)BVBBV022466126 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Avoine, Gildas |e Verfasser |0 (DE-588)1207165204 |4 aut | |
240 | 1 | 0 | |a Sécurité informatique |
245 | 1 | 0 | |a Computer system security |b basic concepts and solved exercises |c Gildas Avoine, Pascal Junod and Philippe Oechslin |
250 | |a 1. ed. | ||
264 | 1 | |a [Lausanne] |b EPFL Press [u.a.] |c 2007 | |
300 | |a XII, 260 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Computer and communication sciences | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Junod, Pascal |d 1976- |e Verfasser |0 (DE-588)1133091261 |4 aut | |
700 | 1 | |a Oechslin, Philippe |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015673716&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015673716 |
Datensatz im Suchindex
_version_ | 1804136551278444544 |
---|---|
adam_text | Contents
Poreword xi
Chapter I Forged E-Mail and Spam
1
1.1
Forging
E-Mail Headers.................... 1
1.2
Spamming
............................
З
1.3 Notes .............................. 7
Exercises
................................. 8
1.
Forged E-Mail
........................... 8
2.
Web Mail Services and Anonymity
................ 8
3.
Information Disclosure
...................... 8
4.
Spam and Open Relays
...................... 8
5.
SMTP Servers that Allow Relaying
............... 9
6.
Anonymous Mails
......................... 9
7.
Rules to Avoid Open Relay
.................... 10
8.
Anti-Spam Software
........................ 10
9.
Prevention against Spam
..................... 10
Solutions
................................. 11
Chapter
2
Malwares
19
2.1
Description and Classification
. . .
.............. 19
2.2
Protection
............................ 28
2.3
Notes
.............................. 31
Exercises
................................. 32
10.
Viruses and Worms
....................... 32
11.
Backdoors and Trojan Horses
.................. 32
12.
Undetectable Viruses
...................... 33
13.
Virus with an Encrypted Attached File
............ 33
14.
BIOS Virus
............................ 33
15.
Analysis of
a
Malware...................... 34
16.
Virus Detection
.......................... 35
17. Antivirus
Software
........................ 35
18.
Filtering Attached Files
..................... 36
19.
Restoring the System after Infection
.............. 36
Solutions
................................. 37
vi Computer System
Security:
Basic
Concepts and Solved
Exercises
Chapter
3
Network and Application Vulnerabilities
43
3.1
TCP/IP Basics
......................... 43
3.2
Denial of Service
........................ 46
3.3
IP Spoofing
........................... 51
3.4
Session Hijacking
........................ 53
3.5
Sniffing
............................. 55
3.6
Exploits
............................. 56
3.7
Notes
.............................. 60
Exercises
................................. 61
20.
Denial of Service Attack
..................... 61
21.
Kevin Mitnick s Attack
..................... 61
22.
IP Spoofing
............................ 63
23.
TCP Hijacking
.......................... 64
24.
Network Traffic Analysis
..................... 65
25.
ARP/DNS Spoofing
....................... 66
26.
DHCP Vulnerabilities
...................... 68
27.
Reminder on
С
Pointers
..................... 69
28.
Address Modification in the Stack
............... 69
29.
Exploit on a Program in
С
................... 70
30.
Vulnerabilities of CGI Scripts
.................. 71
31.
SQL Injection
........................... 72
Solutions
................................. 73
Chapter
4
Firewalls and Proxies
85
4.1
Firewalls
............................. 85
4.2
Proxies
.............................. 103
4.3
Notes
..............................
Ill
Exercises
................................. 112
32.
Basic Principles for Configuring a Firewall
.......... 112
33.
Filtering Rules for a Stateless Firewall
............. 112
34.
Filtering Rules for a Stateless Firewall
(2)........... 112
35.
Filtering Rules for a Stateful Firewall
............. 113
36.
Vulnerabilities of a Stateless Firewall
.............. 113
37.
Network Address Translation
.................. 114
38.
E-mail Headers
.......................... 114
39.
Maximum Number of TCP Connections
............ 115
40.
Peer-to-Peer
........................... 115
41.
FTP Client using NAT
..................... 115
42.
FTP Server using NAT
..................... 115
43.
Pool of Addresses
........................ 115
44.
Connection Authentication
................... 116
45.
HTTPS Proxies Security
.................... 116
46.
FTP Proxy
............................ 116
47.
Transparent Proxy
........................ 117
48.
Proxy Circumvention
...................... 117
CONTENTS
vii
49.
Intrusion
Detection
........................ 118
50.
Intrusion
Detection
System and Proxy
............. 119
51.
Wild
Modems
........................... 119
52.
Network
Security Assessment
.................. 119
53.
Startup SAs Network Security
................. 127
Solutions
................................. 129
Chapter
5
Cryptography
147
5.1
Main Goals of Cryptography
................. 147
5.2
Symmetric-Key Cryptography
................. 148
5.3
Asymmetric Cryptography
................... 150
5.4
Cryptanalysis
.......................... 153
5.5
Notes
.............................. 154
Exercises
................................. 156
54.
Kerckhoffs Principles
...................... 156
55.
Security Objectives
........................ 156
56.
RSA Algorithm
.......................... 156
57.
Decryption of an Encrypted Message Using RSA
....... 157
58.
RSA Vulnerabilities
....................... 157
59.
Exhaustive Search for Symmetric Keys
............ 157
60.
Exhaustive Search for Asymmetric Keys
............ 158
61.
Hash Functions and the Birthday Paradox
........... 158
62.
Symmetric Encryption Modes
.................. 158
63.
Symmetric and Asymmetric Encryption
............ 160
64.
Loss of a Private Key
...................... 160
65.
Certificates
............................ 161
Solutions
................................. 162
Chapter
6·
Secure Communications
169
6.1
Virtual Private Networks
.................... 169
6.2
Transport Layer Security
.................... 175
6.3
Secure Shell
.........................
Ч
· 177
6.4
Notes
.............................. 178
Exercises
................................. 179
66.
L2TP
............................... 179
67.
IPSec
............................... 180
68.
L2TP and
IPSec
......................... 180
69.
IPSec
Between Intermediate Routers
.............. 180
70.
IPSec
and NAT
.......................... 181
71.
IKE
................................ 181
72.
IKE s Main Mode and Aggressive Mode
............ 181
73.
SSH and VPN
.......................... 182
74.
Use of SSH
............................ 183
75.
Authentication Without Passwords Using SSH
........ 183
76.
SSL/TLS
............................. 184
viii Computer System
Security:
Basic
Concepts and Solved Exercises
77.
HTTPS
.............................. 184
78.
Remote Access to a Mail Server
................ 184
Solutions
.................................
186
Chapter
7
Security at the User Level
195
7.1
Password-Based Authentication
................ 195
7.2
Challenge-Response Protocols
................. 202
7.3 Kerberos:
A Network Authentication Protocol
........ 203
7.4
PGP: Pretty Good Privacy
.................. 206
7.5
Notes
.............................. 211
Exercises
................................. 212
79.
Authentication Using Passwords
................ 212
80.
Types of Authentication
..................... 212
81.
Password Hashes
......................... 212
82.
Password Cracking Using an Exhaustive Search
........ 213
83.
Password Cracking Using a Dictionary
............. 213
84.
Stolen Hashes
........................... 213
85.
Authentication on a Web Site
.................. 214
86.
Physical Access Control
..................... 214
87.
Wireless Local Area Network
.................. 217
88. Kerberos
Authentication System
................ 218
89. Kerberos Key
Server
....................... 218
90.
Stealing
Kerberos Keys..................... 218
91. Kerberos
Tickets
......................... 219
92.
Third-Party-Based Authentication Protocol
.......... 219
93.
Authentication with a Centralized Server
........... 220
94.
PGP Certificates and S/MIME
................. 222
95.
Generating PGP Keys
...................... 222
96.
Distinguishing the Keys in PGP
................ 223
97.
PGP Web of Trust
........................ 223
98.
PGP Deployment
......................... 223
99.
Approaches to Secure E-Mails
................. 224
100.
Choosing a Layer to Secure Communications
........ 225
Solutions
................................. 226
Chapter
8
Management of Information Security
243
8.1
Risk Analysis
.......................... 243
8.2
Key Documents
......................... 244
8.3
ISO
27001:
the Information Security Management
System
.............................. 245
8.4
ISO
17799:
Code of Practice for Information Security
Management
.......................... 246
8.5
The German IT Baseline Protection Manual
......... 247
8.6
The Common Criteria
..................... 248
8.7
Notes
.............................. 250
CONTENTS ix
Exercises
................................. 251
101.
Your Position as a Security Officer
.............. 251
102.
Documentation
......................... 251
103.
Security Standards
....................... 251
104.
The Security Gap
........................ 252
105.
Risk Analysis
.......................... 252
106.
Audit
............................... 253
Solutions
................................. 254
Acronyms
257
References
259
|
adam_txt |
Contents
Poreword xi
Chapter I Forged E-Mail and Spam
1
1.1
Forging
E-Mail Headers. 1
1.2
Spamming
.
З
1.3 Notes . 7
Exercises
. 8
1.
Forged E-Mail
. 8
2.
Web Mail Services and Anonymity
. 8
3.
Information Disclosure
. 8
4.
Spam and Open Relays
. 8
5.
SMTP Servers that Allow Relaying
. 9
6.
Anonymous Mails
. 9
7.
Rules to Avoid Open Relay
. 10
8.
Anti-Spam Software
. 10
9.
Prevention against Spam
. 10
Solutions
. 11
Chapter
2
Malwares
19
2.1
Description and Classification
. . .
\
. 19
2.2
Protection
. 28
2.3
Notes
. 31
Exercises
. 32
10.
Viruses and Worms
. 32
11.
Backdoors and Trojan Horses
. 32
12.
Undetectable Viruses
. 33
13.
Virus with an Encrypted Attached File
. 33
14.
BIOS Virus
. 33
15.
Analysis of
a
Malware. 34
16.
Virus Detection
. 35
17. Antivirus
Software
. 35
18.
Filtering Attached Files
. 36
19.
Restoring the System after Infection
. 36
Solutions
. 37
vi Computer System
Security:
Basic
Concepts and Solved
Exercises
Chapter
3
Network and Application Vulnerabilities
43
3.1
TCP/IP Basics
. 43
3.2
Denial of Service
. 46
3.3
IP Spoofing
. 51
3.4
Session Hijacking
. 53
3.5
Sniffing
. 55
3.6
Exploits
. 56
3.7
Notes
. 60
Exercises
. 61
20.
Denial of Service Attack
. 61
21.
Kevin Mitnick's Attack
. 61
22.
IP Spoofing
. 63
23.
TCP Hijacking
. 64
24.
Network Traffic Analysis
. 65
25.
ARP/DNS Spoofing
. 66
26.
DHCP Vulnerabilities
. 68
27.
Reminder on
С
Pointers
. 69
28.
Address Modification in the Stack
. 69
29.
Exploit on a Program in
С
. 70
30.
Vulnerabilities of CGI Scripts
. 71
31.
SQL Injection
. 72
Solutions
. 73
Chapter
4
Firewalls and Proxies
85
4.1
Firewalls
. 85
4.2
Proxies
. 103
4.3
Notes
.
Ill
Exercises
. 112
32.
Basic Principles for Configuring a Firewall
. 112
33.
Filtering Rules for a Stateless Firewall
. 112
34.
Filtering Rules for a Stateless Firewall
(2). 112
35.
Filtering Rules for a Stateful Firewall
. 113
36.
Vulnerabilities of a Stateless Firewall
. 113
37.
Network Address Translation
. 114
38.
E-mail Headers
. 114
39.
Maximum Number of TCP Connections
. 115
40.
Peer-to-Peer
. 115
41.
FTP Client using NAT
. 115
42.
FTP Server using NAT
. 115
43.
Pool of Addresses
. 115
44.
Connection Authentication
. 116
45.
HTTPS Proxies' Security
. 116
46.
FTP Proxy
. 116
47.
Transparent Proxy
. 117
48.
Proxy Circumvention
. 117
CONTENTS
vii
49.
Intrusion
Detection
. 118
50.
Intrusion
Detection
System and Proxy
. 119
51.
Wild
Modems
. 119
52.
Network
Security Assessment
. 119
53.
Startup SAs Network Security
. 127
Solutions
. 129
Chapter
5
Cryptography
147
5.1
Main Goals of Cryptography
. 147
5.2
Symmetric-Key Cryptography
. 148
5.3
Asymmetric Cryptography
. 150
5.4
Cryptanalysis
. 153
5.5
Notes
. 154
Exercises
. 156
54.
Kerckhoffs' Principles
. 156
55.
Security Objectives
. 156
56.
RSA Algorithm
. 156
57.
Decryption of an Encrypted Message Using RSA
. 157
58.
RSA Vulnerabilities
. 157
59.
Exhaustive Search for Symmetric Keys
. 157
60.
Exhaustive Search for Asymmetric Keys
. 158
61.
Hash Functions and the Birthday Paradox
. 158
62.
Symmetric Encryption Modes
. 158
63.
Symmetric and Asymmetric Encryption
. 160
64.
Loss of a Private Key
. 160
65.
Certificates
. 161
Solutions
. 162
Chapter
6·
Secure Communications
169
6.1
Virtual Private Networks
. 169
6.2
Transport Layer Security
. 175
6.3
Secure Shell
.
Ч
· 177
6.4
Notes
. 178
Exercises
. 179
66.
L2TP
. 179
67.
IPSec
. 180
68.
L2TP and
IPSec
. 180
69.
IPSec
Between Intermediate Routers
. 180
70.
IPSec
and NAT
. 181
71.
IKE
. 181
72.
IKE's Main Mode and Aggressive Mode
. 181
73.
SSH and VPN
. 182
74.
Use of SSH
. 183
75.
Authentication Without Passwords Using SSH
. 183
76.
SSL/TLS
. 184
viii Computer System
Security:
Basic
Concepts and Solved Exercises
77.
HTTPS
. 184
78.
Remote Access to a Mail Server
. 184
Solutions
.
186
Chapter
7
Security at the User Level
195
7.1
Password-Based Authentication
. 195
7.2
Challenge-Response Protocols
. 202
7.3 Kerberos:
A Network Authentication Protocol
. 203
7.4
PGP: Pretty Good Privacy
. 206
7.5
Notes
. 211
Exercises
. 212
79.
Authentication Using Passwords
. 212
80.
Types of Authentication
. 212
81.
Password Hashes
. 212
82.
Password Cracking Using an Exhaustive Search
. 213
83.
Password Cracking Using a Dictionary
. 213
84.
Stolen Hashes
. 213
85.
Authentication on a Web Site
. 214
86.
Physical Access Control
. 214
87.
Wireless Local Area Network
. 217
88. Kerberos
Authentication System
. 218
89. Kerberos Key
Server
. 218
90.
Stealing
Kerberos Keys. 218
91. Kerberos
Tickets
. 219
92.
Third-Party-Based Authentication Protocol
. 219
93.
Authentication with a Centralized Server
. 220
94.
PGP Certificates and S/MIME
. 222
95.
Generating PGP Keys
. 222
96.
Distinguishing the Keys in PGP
. 223
97.
PGP Web of Trust
. 223
98.
PGP Deployment
. 223
99.
Approaches to Secure E-Mails
. 224
100.
Choosing a Layer to Secure Communications
. 225
Solutions
. 226
Chapter
8
Management of Information Security
243
8.1
Risk Analysis
. 243
8.2
Key Documents
. 244
8.3
ISO
27001:
the Information Security Management
System
. 245
8.4
ISO
17799:
Code of Practice for Information Security
Management
. 246
8.5
The German IT Baseline Protection Manual
. 247
8.6
The Common Criteria
. 248
8.7
Notes
. 250
CONTENTS ix
Exercises
. 251
101.
Your Position as a Security Officer
. 251
102.
Documentation
. 251
103.
Security Standards
. 251
104.
The Security Gap
. 252
105.
Risk Analysis
. 252
106.
Audit
. 253
Solutions
. 254
Acronyms
257
References
259 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Avoine, Gildas Junod, Pascal 1976- Oechslin, Philippe |
author_GND | (DE-588)1207165204 (DE-588)1133091261 |
author_facet | Avoine, Gildas Junod, Pascal 1976- Oechslin, Philippe |
author_role | aut aut aut |
author_sort | Avoine, Gildas |
author_variant | g a ga p j pj p o po |
building | Verbundindex |
bvnumber | BV022466126 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ST 277 |
ctrlnum | (OCoLC)74968237 (DE-599)BVBBV022466126 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01676nam a2200433 c 4500</leader><controlfield tag="001">BV022466126</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210319 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070615s2007 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781420046205</subfield><subfield code="9">978-1-4200-4620-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9782940222148</subfield><subfield code="9">978-2-940222-14-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)74968237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022466126</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Avoine, Gildas</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1207165204</subfield><subfield code="4">aut</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer system security</subfield><subfield code="b">basic concepts and solved exercises</subfield><subfield code="c">Gildas Avoine, Pascal Junod and Philippe Oechslin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Lausanne]</subfield><subfield code="b">EPFL Press [u.a.]</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 260 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computer and communication sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Junod, Pascal</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1133091261</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oechslin, Philippe</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015673716&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015673716</subfield></datafield></record></collection> |
id | DE-604.BV022466126 |
illustrated | Illustrated |
index_date | 2024-07-02T17:42:27Z |
indexdate | 2024-07-09T20:58:12Z |
institution | BVB |
isbn | 9781420046205 9782940222148 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015673716 |
oclc_num | 74968237 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-355 DE-BY-UBR |
physical | XII, 260 S. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | EPFL Press [u.a.] |
record_format | marc |
series2 | Computer and communication sciences |
spelling | Avoine, Gildas Verfasser (DE-588)1207165204 aut Sécurité informatique Computer system security basic concepts and solved exercises Gildas Avoine, Pascal Junod and Philippe Oechslin 1. ed. [Lausanne] EPFL Press [u.a.] 2007 XII, 260 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer and communication sciences Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Junod, Pascal 1976- Verfasser (DE-588)1133091261 aut Oechslin, Philippe Verfasser aut Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015673716&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Avoine, Gildas Junod, Pascal 1976- Oechslin, Philippe Computer system security basic concepts and solved exercises Computer security Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Computer system security basic concepts and solved exercises |
title_alt | Sécurité informatique |
title_auth | Computer system security basic concepts and solved exercises |
title_exact_search | Computer system security basic concepts and solved exercises |
title_exact_search_txtP | Computer system security basic concepts and solved exercises |
title_full | Computer system security basic concepts and solved exercises Gildas Avoine, Pascal Junod and Philippe Oechslin |
title_fullStr | Computer system security basic concepts and solved exercises Gildas Avoine, Pascal Junod and Philippe Oechslin |
title_full_unstemmed | Computer system security basic concepts and solved exercises Gildas Avoine, Pascal Junod and Philippe Oechslin |
title_short | Computer system security |
title_sort | computer system security basic concepts and solved exercises |
title_sub | basic concepts and solved exercises |
topic | Computer security Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015673716&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT avoinegildas securiteinformatique AT junodpascal securiteinformatique AT oechslinphilippe securiteinformatique AT avoinegildas computersystemsecuritybasicconceptsandsolvedexercises AT junodpascal computersystemsecuritybasicconceptsandsolvedexercises AT oechslinphilippe computersystemsecuritybasicconceptsandsolvedexercises |