Information security: principles and practice
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2011
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 584 S. Ill., graph. Darst. |
ISBN: | 9780470626399 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV036862187 | ||
003 | DE-604 | ||
005 | 20110620 | ||
007 | t | ||
008 | 101209s2011 xxuad|| |||| 00||| eng d | ||
015 | |a GBA560653 |2 dnb | ||
020 | |a 9780470626399 |9 978-0-470-62639-9 | ||
035 | |a (OCoLC)706060446 | ||
035 | |a (DE-599)BVBBV036862187 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-20 |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Stamp, Mark |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security |b principles and practice |c Mark Stamp |
250 | |a 2. ed. | ||
264 | 1 | |a Hoboken, NJ |b Wiley |c 2011 | |
300 | |a XXI, 584 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 2 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020777926 |
Datensatz im Suchindex
_version_ | 1804143562581868544 |
---|---|
adam_text | Titel: Information security
Autor: Stamp, Mark
Jahr: 2011
Contents
Preface xv
About The Author xix
Acknowledgments xxi
1 Introduction 1
1.1 The Cast of Characters..................... 1
1.2 Alice s Online Bank ....................... 2
1.2.1 Confidentiality, Integrity, and Availability....... 2
1.2.2 Beyond CIA........................ 3
1.3 About This Book......................... 4
1.3.1 Cryptography....................... 5
1.3.2 Access Control...................... 6
1.3.3 Protocols......................... 7
1.3.4 Software.......................... 8
1.4 The People Problem....................... 8
1.5 Principles and Practice...................... 9
1.6 Problems ............................. 10
1 Crypto 17
2 Crypto Basics 19
2.1 Introduction............................ 19
2.2 How to Speak Crypto...................... 20
2.3 Classic Crypto.......................... 22
2.3.1 Simple Substitution Cipher............... 22
2.3.2 Cryptanalysis of a Simple Substitution......... 24
2.3.3 Definition of Secure ................... 25
2.3.4 Double Transposition Cipher.............. 26
2.3.5 One-Time Pad...................... 27
2.3.6 Project VENONA.................... 31
CONTENTS
2.3.7 Codebook Cipher..................... 32
2.3.8 Ciphers of the Election of 1876............. 35
2.4 Modern Crypto History..................... 37
2.5 A Taxonomy of Cryptography.................. 40
2.6 A Taxonomy of Cryptanalysis.................. 41
2.7 Summary............................. 42
2.8 Problems............................. 43
Symmetric Key Crypto 51
3.1 Introduction............................ 51
3.2 Stream Ciphers.......................... 52
3.2.1 A5/1............................ 53
3.2.2 RC4............................ 55
3.3 Block Ciphers........................... 57
3.3.1 Feistel Cipher....................... 57
3.3.2 DES............................ 58
3.3.3 Triple DES........................ 65
3.3.4 AES............................ 67
3.3.5 Three More Block Ciphers................ 69
3.3.6 TEA............................ 70
3.3.7 Block Cipher Modes................... 72
3.4 Integrity.............................. 76
3.5 Summary............................. 78
3.6 Problems............................. 79
Public Key Crypto 89
4.1 Introduction............................ 89
4.2 Knapsack............................. 91
4.3 RSA................................ 95
4.3.1 Textbook RSA Example................. 97
4.3.2 Repeated Squaring.................... 98
4.3.3 Speeding Up RSA.................... 99
4.4 Diffie-Hellman........................... 100
4.5 Elliptic Curve Cryptography .................. 102
4.5.1 Elliptic Curve Math................... 103
4.5.2 ECC Diffie-Hellman................... 105
4.5.3 Realistic Elliptic Curve Example............ 106
4.6 Public Key Notation....................... 107
4.7 Uses for Public Key Crypto................... 107
4.7.1 Confidentiality in the Real World............ 108
4.7.2 Signatures and Non-repudiation............. 108
4.7.3 Confidentiality and Non-repudiation.......... 109
4.8 Public Key Infrastructure.................... 112
CONTENTS
4.9 Summary............................. 114
4.10 Problems ............................. 115
Hash Functions++ 125
5.1 Introduction............................ 125
5.2 What is a Cryptographic Hash Function?........... 126
5.3 The Birthday Problem...................... 128
5.4 A Birthday Attack........................ 129
5.5 Non-Cryptographic Hashes ................... 130
5.6 Tiger Hash............................ 132
5.7 HMAC............................... 136
5.8 Uses for Hash Functions..................... 139
5.8.1 Online Bids........................ 139
5.8.2 Spam Reduction..................... 140
5.9 Miscellaneous Crypto-Related Topics.............. 141
5.9.1 Secret Sharing...................... 142
5.9.2 Random Numbers.................... 145
5.9.3 Information Hiding.................... 148
5.10 Summary............................. 153
5.11 Problems ............................. 153
Advanced Cryptanalysis 167
6.1 Introduction............................ 167
6.2 Enigma.............................. 169
6.2.1 Enigma Cipher Machine................. 169
6.2.2 Enigma Keyspace..................... 172
6.2.3 Rotors........................... 174
6.2.4 Enigma Attack...................... 176
6.3 RC4 as Used in WEP ...................... 179
6.3.1 RC4 Algorithm...................... 180
6.3.2 RC4 Cryptanalytic Attack................ 181
6.3.3 Preventing Attacks on RC4............... 185
6.4 Linear and Differential Cryptanalysis.............. 186
6.4.1 Quick Review of DES.................. 186
6.4.2 Overview of Differential Cryptanalysis ........ 187
6.4.3 Overview of Linear Cryptanalysis ........... 190
6.4.4 Tiny DES......................... 192
6.4.5 Differential Cryptanalysis of TDES .......... 194
6.4.6 Linear Cryptanalysis of TDES ............. 199
6.4.7 Implications Block Cipher Design............ 202
6.5 Lattice Reduction and the Knapsack.............. 203
6.6 RSA Timing Attacks ...................... 210
6.6.1 A Simple Timing Attack................. 211
CONTENTS
6.6.2 Kocher s Timing Attack................. 214
6.7 Summary............................. 218
6.8 Problems ............................. 218
II Access Control 227
7 Authentication 229
7.1 Introduction............................ 229
7.2 Authentication Methods..................... 230
7.3 Passwords............................. 231
7.3.1 Keys Versus Passwords ................. 232
7.3.2 Choosing Passwords................... 232
7.3.3 Attacking Systems via Passwords............ 234
7.3.4 Password Verification.................. 235
7.3.5 Math of Password Cracking .............. 237
7.3.6 Other Password Issues.................. 240
7.4 Biometrics............................. 242
7.4.1 Types of Errors...................... 244
7.4.2 Biometrie Examples................... 244
7.4.3 Biometrie Error Rates.................. 250
7.4.4 Biometrie Conclusions.................. 250
7.5 Something You Have....................... 251
7.6 Two-Factor Authentication................... 252
7.7 Single Sign-On and Web Cookies................ 252
7.8 Summary............................. 254
7.9 Problems ............................. 254
8 Authorization 265
8.1 Introduction............................ 265
8.2 A Brief History of Authorization................ 266
8.2.1 The Orange Book .................... 266
8.2.2 The Common Criteria.................. 269
8.3 Access Control Matrix...................... 271
8.3.1 ACLs and Capabilities.................. 272
8.3.2 Confused Deputy..................... 273
8.4 Multilevel Security Models.................... 274
8.4.1 Bell-LaPadula....................... 276
8.4.2 Biba s Model....................... 278
8.5 Compartments.......................... 279
8.6 Covert Channel ......................... 281
8.7 Inference Control......................... 283
8.8 CAPTCHA............................ 285
CONTENTS
8.9 Firewalls.............................. 287
8.9.1 Packet Filter....................... 288
8.9.2 Stateful Packet Filter .................. 290
8.9.3 Application Proxy.................... 291
8.9.4 Personal Firewall..................... 293
8.9.5 Defense in Depth .................... 293
8.10 Intrusion Detection Systems................... 294
8.10.1 Signature-Based IDS................... 296
8.10.2 Anomaly-Based IDS................... 297
8.11 Summary............................. 301
8.12 Problems ............................. 302
III Protocols 311
9 Simple Authentication Protocols 313
9.1 Introduction............................ 313
9.2 Simple Security Protocols.................... 315
9.3 Authentication Protocols .................... 317
9.3.1 Authentication Using Symmetric Keys......... 320
9.3.2 Authentication Using Public Keys........... 323
9.3.3 Session Keys....................... 325
9.3.4 Perfect Forward Secrecy................. 327
9.3.5 Mutual Authentication, Session Key, and PFS .... 329
9.3.6 Timestamps........................ 330
9.4 Authentication and TCP .................... 332
9.5 Zero Knowledge Proofs...................... 335
9.6 The Best Authentication Protocol?............... 339
9.7 Summary............................. 339
9.8 Problems ............................. 340
10 Real-World Security Protocols 351
10.1 Introduction............................ 351
10.2 SSH................................ 352
10.3 SSL ................................ 353
10.3.1 SSL and the Man-in-the-Middle............. 356
10.3.2 SSL Connections..................... 357
10.3.3 SSL Versus IPSec .................... 358
10.4 IPSec............................... 359
10.4.1 IKE Phase 1: Digital Signature............. 361
10.4.2 IKE Phase 1: Symmetric Key.............. 363
10.4.3 IKE Phase 1: Public Key Encryption ......... 364
10.4.4 IPSec Cookies....................... 366
xa CONTENTS
10.4.5 IKE Phase 1 Summary.................. 366
10.4.6 IKE Phase 2 ....................... 367
10.4.7 IPSec and IP Datagrams ................ 368
10.4.8 Transport and Tunnel Modes.............. 369
10.4.9 ESP and AH....................... 370
10.5 Kerberos.............................. 372
10.5.1 Kerberized Login..................... 374
10.5.2 Kerberos Ticket ..................... 375
10.5.3 Kerberos Security .................... 376
10.6 WEP................................ 377
10.6.1 WEP Authentication................... 377
10.6.2 WEP Encryption..................... 378
10.6.3 WEP Non-Integrity ................... 379
10.6.4 Other WEP Issues.................... 379
10.6.5 WEP: The Bottom Line................. 380
10.7 GSM................................ 381
10.7.1 GSM Architecture.................... 381
10.7.2 GSM Security Architecture............... 383
10.7.3 GSM Authentication Protocol ............. 385
10.7.4 GSM Security Flaws................... 386
10.7.5 GSM Conclusions..................... 388
10.7.6 3GPP........................... 389
10.8 Summary............................. 389
10.9 Problems ............................. 390
IV Software 401
11 Software Flaws and Malware 403
11.1 Introduction............................ 403
11.2 Software Flaws.......................... 404
11.2.1 Buffer Overflow...................... 407
11.2.2 Incomplete Mediation.................. 418
11.2.3 Race Conditions..................... 419
11.3 Malware.............................. 421
11.3.1 Brain........................... 422
11.3.2 Morris Worm....................... 422
11.3.3 Code Red......................... 424
11.3.4 SQL Slammer....................... 425
11.3.5 Trojan Example..................... 426
11.3.6 Malware Detection.................... 427
11.3.7 The Future of Malware ................. 429
11.3.8 Cyber Diseases Versus Biological Diseases....... 432
CONTENTS
11.4 Botnets.............................. 433
11.5 Miscellaneous Software-Based Attacks............. 433
11.5.1 Salami Attacks...................... 434
11.5.2 Linearization Attacks .................. 434
11.5.3 Time Bombs....................... 436
11.5.4 Trusting Software .................... 436
11.6 Summary............................. 437
11.7 Problems ............................. 438
12 Insecurity in Software 447
12.1 Introduction............................ 447
12.2 Software Reverse Engineering.................. 448
12.2.1 Reversing Java Bytecode ................ 450
12.2.2 SRE Example....................... 451
12.2.3 Anti-Disassembly Techniques.............. 455
12.2.4 Anti-Debugging Techniques............... 456
12.2.5 Software Tamper Resistance .............. 457
12.2.6 Metamorphism 2.0.................... 459
12.3 Digital Rights Management................... 460
12.3.1 What is DRM?...................... 460
12.3.2 A Real-World DRM System............... 464
12.3.3 DRM for Streaming Media............... 467
12.3.4 DRM for a P2P Application .............. 469
12.3.5 Enterprise DRM..................... 470
12.3.6 DRM Failures....................... 471
12.3.7 DRM Conclusions.................... 472
12.4 Software Development...................... 472
12.4.1 Open Versus Closed Source Software.......... 473
12.4.2 Finding Flaws ...................... 476
12.4.3 Other Software Development Issues........... 477
12.5 Summary............................. 481
12.6 Problems ............................. 481
13 Operating Systems and Security 491
13.1 Introduction............................ 491
13.2 OS Security Functions...................... 492
13.2.1 Separation ........................ 492
13.2.2 Memory Protection.................... 492
13.2.3 Access Control...................... 494
13.3 Trusted Operating System.................... 495
13.3.1 MAC, DAC, and More ................. 495
13.3.2 Trusted Path....................... 497
13.3.3 Trusted Computing Base ................ 498
xiv_______________________________________________CONTENTS
13.4 Next Generation Secure Computing Base ........... 500
13.4.1 NGSCB Feature Groups ................ 502
13.4.2 NGSCB Compelling Applications ........... 503
13.4.3 Criticisms of NGSCB .................. 504
13.5 Summary............................. 506
13.6 Problems............................. 506
Appendix 511
A-l Network Security Basics..................... 511
A-l.l Introduction ....................... 511
A-1.2 The Protocol Stack.................... 512
A-l.3 Application Layer .................... 514
A-1.4 Transport Layer..................... 516
A-1.5 Network Layer...................... 519
A-1.6 Link Layer ........................ 521
A-1.7 Conclusions........................ 523
A-2 Math Essentials.......................... 523
A-2.1 Introduction ....................... 523
A-2.2 Modular Arithmetic................... 524
A-2.3 Permutations....................... 526
A-2.4 Probability........................ 526
A-2.5 Linear Algebra...................... 527
A-2.6 Conclusions........................ 529
Annotated Bibliography 531
Index 572
|
any_adam_object | 1 |
author | Stamp, Mark |
author_facet | Stamp, Mark |
author_role | aut |
author_sort | Stamp, Mark |
author_variant | m s ms |
building | Verbundindex |
bvnumber | BV036862187 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 230 ST 276 ST 277 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)706060446 (DE-599)BVBBV036862187 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02060nam a2200553zc 4500</leader><controlfield tag="001">BV036862187</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110620 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">101209s2011 xxuad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA560653</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470626399</subfield><subfield code="9">978-0-470-62639-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706060446</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036862187</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stamp, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="b">principles and practice</subfield><subfield code="c">Mark Stamp</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 584 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020777926</subfield></datafield></record></collection> |
id | DE-604.BV036862187 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:49:38Z |
institution | BVB |
isbn | 9780470626399 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020777926 |
oclc_num | 706060446 |
open_access_boolean | |
owner | DE-20 DE-355 DE-BY-UBR |
owner_facet | DE-20 DE-355 DE-BY-UBR |
physical | XXI, 584 S. Ill., graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
spelling | Stamp, Mark Verfasser aut Information security principles and practice Mark Stamp 2. ed. Hoboken, NJ Wiley 2011 XXI, 584 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Kommunikationsprotokoll (DE-588)4128252-8 s Malware (DE-588)4687059-3 s DE-604 Zugriffskontrolle (DE-588)4293034-0 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stamp, Mark Information security principles and practice Computer security Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Kryptologie (DE-588)4033329-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4687059-3 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4033329-2 (DE-588)4128252-8 |
title | Information security principles and practice |
title_auth | Information security principles and practice |
title_exact_search | Information security principles and practice |
title_full | Information security principles and practice Mark Stamp |
title_fullStr | Information security principles and practice Mark Stamp |
title_full_unstemmed | Information security principles and practice Mark Stamp |
title_short | Information security |
title_sort | information security principles and practice |
title_sub | principles and practice |
topic | Computer security Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Kryptologie (DE-588)4033329-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
topic_facet | Computer security Computersicherheit Malware Datensicherung Zugriffskontrolle Kryptologie Kommunikationsprotokoll |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stampmark informationsecurityprinciplesandpractice |