Securing the information infrastructure:
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
Cybertech Publ.
2008
|
Schlagworte: | |
Zusammenfassung: | "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XIV, 368 S. Ill. 26 cm |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022945886 | ||
003 | DE-604 | ||
005 | 20080201 | ||
007 | t | ||
008 | 071102s2008 a||| |||| 00||| eng d | ||
020 | |z 9781599043791 (hardcover) |9 9781599043791 (hardcover) | ||
020 | |z 1599043793 (hardcover) |9 1599043793 (hardcover) | ||
020 | |z 9781599043814 (ebook) |9 9781599043814 (ebook) | ||
020 | |z 1599043815 (ebook) |9 1599043815 (ebook) | ||
035 | |a (OCoLC)85833270 | ||
035 | |a (DE-599)BVBBV022945886 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Kizza, Joseph Migga |d 1950- |e Verfasser |0 (DE-588)118069020 |4 aut | |
245 | 1 | 0 | |a Securing the information infrastructure |c Joseph M. Kizza ; Florence M. Kizza |
264 | 1 | |a Hershey, PA |b Cybertech Publ. |c 2008 | |
300 | |a XIV, 368 S. |b Ill. |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Internet / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Information superhighway / Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Information superhighway |x Security measures | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Kizza, Florence Migga |e Verfasser |4 aut | |
999 | |a oai:aleph.bib-bvb.de:BVB01-016150456 |
Datensatz im Suchindex
_version_ | 1804137186134589440 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kizza, Joseph Migga 1950- Kizza, Florence Migga |
author_GND | (DE-588)118069020 |
author_facet | Kizza, Joseph Migga 1950- Kizza, Florence Migga |
author_role | aut aut |
author_sort | Kizza, Joseph Migga 1950- |
author_variant | j m k jm jmk f m k fm fmk |
building | Verbundindex |
bvnumber | BV022945886 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)85833270 (DE-599)BVBBV022945886 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02254nam a2200553 c 4500</leader><controlfield tag="001">BV022945886</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080201 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">071102s2008 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781599043791 (hardcover)</subfield><subfield code="9">9781599043791 (hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1599043793 (hardcover)</subfield><subfield code="9">1599043793 (hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781599043814 (ebook)</subfield><subfield code="9">9781599043814 (ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1599043815 (ebook)</subfield><subfield code="9">1599043815 (ebook)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85833270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022945886</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kizza, Joseph Migga</subfield><subfield code="d">1950-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)118069020</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the information infrastructure</subfield><subfield code="c">Joseph M. Kizza ; Florence M. Kizza</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">Cybertech Publ.</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 368 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information superhighway / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information superhighway</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kizza, Florence Migga</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016150456</subfield></datafield></record></collection> |
id | DE-604.BV022945886 |
illustrated | Illustrated |
index_date | 2024-07-02T18:59:48Z |
indexdate | 2024-07-09T21:08:17Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016150456 |
oclc_num | 85833270 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XIV, 368 S. Ill. 26 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Cybertech Publ. |
record_format | marc |
spelling | Kizza, Joseph Migga 1950- Verfasser (DE-588)118069020 aut Securing the information infrastructure Joseph M. Kizza ; Florence M. Kizza Hershey, PA Cybertech Publ. 2008 XIV, 368 S. Ill. 26 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Computer networks Security measures Information superhighway Security measures Internet Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s DE-604 Computersicherheit (DE-588)4274324-2 s Kizza, Florence Migga Verfasser aut |
spellingShingle | Kizza, Joseph Migga 1950- Kizza, Florence Migga Securing the information infrastructure Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Computer networks Security measures Information superhighway Security measures Internet Security measures Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4308416-3 |
title | Securing the information infrastructure |
title_auth | Securing the information infrastructure |
title_exact_search | Securing the information infrastructure |
title_exact_search_txtP | Securing the information infrastructure |
title_full | Securing the information infrastructure Joseph M. Kizza ; Florence M. Kizza |
title_fullStr | Securing the information infrastructure Joseph M. Kizza ; Florence M. Kizza |
title_full_unstemmed | Securing the information infrastructure Joseph M. Kizza ; Florence M. Kizza |
title_short | Securing the information infrastructure |
title_sort | securing the information infrastructure |
topic | Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Computer networks Security measures Information superhighway Security measures Internet Security measures Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Computer networks Security measures Information superhighway Security measures Internet Security measures Datensicherung Computersicherheit Internet |
work_keys_str_mv | AT kizzajosephmigga securingtheinformationinfrastructure AT kizzaflorencemigga securingtheinformationinfrastructure |