Information assurance: dependability and security in networked systems
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier/Morgan Kaufmann
c2008
|
Schriftenreihe: | Morgan Kaufmann series in networking
Morgan Kaufmann series in computer security |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Mode of access: World Wide Web Includes bibliographical references and index PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks Printbegrænsninger: Der kan printes kapitelvis |
Beschreibung: | 1 Online-Ressource (xxxvii, 537 p.) |
ISBN: | 0080555888 9780080555881 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043095540 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 0080555888 |c electronic bk. |9 0-08-055588-8 | ||
020 | |a 9780080555881 |c electronic bk. |9 978-0-08-055588-1 | ||
035 | |a (OCoLC)190760120 | ||
035 | |a (DE-599)BVBBV043095540 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Information assurance |b dependability and security in networked systems |c [edited by] Yi Qian ... [et al.] |
264 | 1 | |a Amsterdam |b Elsevier/Morgan Kaufmann |c c2008 | |
300 | |a 1 Online-Ressource (xxxvii, 537 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Morgan Kaufmann series in networking | |
490 | 0 | |a Morgan Kaufmann series in computer security | |
500 | |a Mode of access: World Wide Web | ||
500 | |a Includes bibliographical references and index | ||
500 | |a PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. | ||
500 | |a In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks | ||
500 | |a Printbegrænsninger: Der kan printes kapitelvis | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Reliability |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Reliability | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Qian, Yi |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 0-12-373566-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-12-373566-9 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028519732 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175500373917696 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043095540 |
classification_rvk | ST 276 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)190760120 (DE-599)BVBBV043095540 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04926nmm a2200649zc 4500</leader><controlfield tag="001">BV043095540</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080555888</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055588-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080555881</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055588-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)190760120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043095540</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information assurance</subfield><subfield code="b">dependability and security in networked systems</subfield><subfield code="c">[edited by] Yi Qian ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier/Morgan Kaufmann</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxvii, 537 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Morgan Kaufmann series in networking</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Morgan Kaufmann series in computer security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Printbegrænsninger: Der kan printes kapitelvis</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Reliability</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qian, Yi</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">0-12-373566-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-12-373566-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028519732</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043095540 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:16Z |
institution | BVB |
isbn | 0080555888 9780080555881 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028519732 |
oclc_num | 190760120 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxxvii, 537 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Elsevier/Morgan Kaufmann |
record_format | marc |
series2 | Morgan Kaufmann series in networking Morgan Kaufmann series in computer security |
spelling | Information assurance dependability and security in networked systems [edited by] Yi Qian ... [et al.] Amsterdam Elsevier/Morgan Kaufmann c2008 1 Online-Ressource (xxxvii, 537 p.) txt rdacontent c rdamedia cr rdacarrier Morgan Kaufmann series in networking Morgan Kaufmann series in computer security Mode of access: World Wide Web Includes bibliographical references and index PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks Printbegrænsninger: Der kan printes kapitelvis COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Reliability fast Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer networks Reliability Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Zuverlässigkeit (DE-588)4059245-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Zuverlässigkeit (DE-588)4059245-5 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Qian, Yi Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 0-12-373566-1 Erscheint auch als Druck-Ausgabe, Paperback 978-0-12-373566-9 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Information assurance dependability and security in networked systems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Reliability fast Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer networks Reliability Computer security Computersicherheit (DE-588)4274324-2 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4059245-5 (DE-588)4070085-9 |
title | Information assurance dependability and security in networked systems |
title_auth | Information assurance dependability and security in networked systems |
title_exact_search | Information assurance dependability and security in networked systems |
title_full | Information assurance dependability and security in networked systems [edited by] Yi Qian ... [et al.] |
title_fullStr | Information assurance dependability and security in networked systems [edited by] Yi Qian ... [et al.] |
title_full_unstemmed | Information assurance dependability and security in networked systems [edited by] Yi Qian ... [et al.] |
title_short | Information assurance |
title_sort | information assurance dependability and security in networked systems |
title_sub | dependability and security in networked systems |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Reliability fast Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer networks Reliability Computer security Computersicherheit (DE-588)4274324-2 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Reliability Computer networks / Security measures Computer security Computer networks Security measures Computer networks Reliability Computersicherheit Zuverlässigkeit Rechnernetz |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214765 |
work_keys_str_mv | AT qianyi informationassurancedependabilityandsecurityinnetworkedsystems |