Securing information and communications systems: principles, technologies, and applications
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston
Artech House
©2008
|
Schriftenreihe: | Artech House information security and privacy series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems |
Beschreibung: | 1 Online-Ressource (xiv, 362 pages) |
ISBN: | 1596932295 9781596932296 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043074287 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 1596932295 |c electronic bk. |9 1-59693-229-5 | ||
020 | |a 9781596932296 |c electronic bk. |9 978-1-59693-229-6 | ||
035 | |a (OCoLC)434586632 | ||
035 | |a (DE-599)BVBBV043074287 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Securing information and communications systems |b principles, technologies, and applications |c Steven M. Furnell [and others], editors |
264 | 1 | |a Boston |b Artech House |c ©2008 | |
300 | |a 1 Online-Ressource (xiv, 362 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House information security and privacy series | |
500 | |a Includes bibliographical references and index | ||
500 | |a Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security | ||
500 | |a This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems | ||
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Systèmes informatiques / Sécurité / Mesures | |
650 | 4 | |a Infrastructure à clé publique (Sécurité informatique) | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Furnell, Steven |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028498479 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175460472455168 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043074287 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)434586632 (DE-599)BVBBV043074287 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03792nmm a2200613zc 4500</leader><controlfield tag="001">BV043074287</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932295</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59693-229-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932296</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59693-229-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)434586632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043074287</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing information and communications systems</subfield><subfield code="b">principles, technologies, and applications</subfield><subfield code="c">Steven M. Furnell [and others], editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">©2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 362 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes informatiques / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure à clé publique (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028498479</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043074287 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:38Z |
institution | BVB |
isbn | 1596932295 9781596932296 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028498479 |
oclc_num | 434586632 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiv, 362 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Artech House |
record_format | marc |
series2 | Artech House information security and privacy series |
spelling | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors Boston Artech House ©2008 1 Online-Ressource (xiv, 362 pages) txt rdacontent c rdamedia cr rdacarrier Artech House information security and privacy series Includes bibliographical references and index Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Chiffrement (Informatique) Systèmes informatiques / Sécurité / Mesures Infrastructure à clé publique (Sécurité informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data encryption (Computer science) fast Computer security Computer networks Security measures Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Furnell, Steven Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Securing information and communications systems principles, technologies, and applications Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Chiffrement (Informatique) Systèmes informatiques / Sécurité / Mesures Infrastructure à clé publique (Sécurité informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data encryption (Computer science) fast Computer security Computer networks Security measures Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4069386-7 |
title | Securing information and communications systems principles, technologies, and applications |
title_auth | Securing information and communications systems principles, technologies, and applications |
title_exact_search | Securing information and communications systems principles, technologies, and applications |
title_full | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors |
title_fullStr | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors |
title_full_unstemmed | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors |
title_short | Securing information and communications systems |
title_sort | securing information and communications systems principles technologies and applications |
title_sub | principles, technologies, and applications |
topic | Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Chiffrement (Informatique) Systèmes informatiques / Sécurité / Mesures Infrastructure à clé publique (Sécurité informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data encryption (Computer science) fast Computer security Computer networks Security measures Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
topic_facet | Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Chiffrement (Informatique) Systèmes informatiques / Sécurité / Mesures Infrastructure à clé publique (Sécurité informatique) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Data encryption (Computer science) Computer networks Security measures Computersicherheit Betriebliches Informationssystem |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284257 |
work_keys_str_mv | AT furnellsteven securinginformationandcommunicationssystemsprinciplestechnologiesandapplications |