Information assurance and computer security:
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
©2006
|
Schriftenreihe: | NATO security through science series
v. 6 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--Title page verso. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references and author index Title page; Preface; Contents; Theory; Tools; Architecture; Applications; Author Index Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel |
Beschreibung: | 1 Online-Ressource (viii, 205 pages) |
ISBN: | 1429467649 1433701529 1586036785 1607502097 9781429467643 9781433701528 9781586036782 9781607502098 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043101234 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2006 |||| o||u| ||||||eng d | ||
020 | |a 1429467649 |c electronic bk. |9 1-4294-6764-9 | ||
020 | |a 1433701529 |c electronic bk. : Adobe Reader |9 1-4337-0152-9 | ||
020 | |a 1586036785 |9 1-58603-678-5 | ||
020 | |a 1607502097 |9 1-60750-209-7 | ||
020 | |a 9781429467643 |c electronic bk. |9 978-1-4294-6764-3 | ||
020 | |a 9781433701528 |c electronic bk. : Adobe Reader |9 978-1-4337-0152-8 | ||
020 | |a 9781586036782 |9 978-1-58603-678-2 | ||
020 | |a 9781607502098 |9 978-1-60750-209-8 | ||
035 | |a (OCoLC)228170469 | ||
035 | |a (DE-599)BVBBV043101234 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
110 | 2 | |a NATO Advanced Research Workshop on Information Assurance and Computer Security <2005, Tétouan, Morocco> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information assurance and computer security |c edited by Johnson P. Thomas and Mohamed Essaaidi |
264 | 1 | |a Amsterdam |b IOS Press |c ©2006 | |
300 | |a 1 Online-Ressource (viii, 205 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO security through science series |v v. 6 | |
500 | |a "Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--Title page verso. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Includes bibliographical references and author index | ||
500 | |a Title page; Preface; Contents; Theory; Tools; Architecture; Applications; Author Index | ||
500 | |a Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
700 | 1 | |a Thomas, Johnson P. |e Sonstige |4 oth | |
700 | 1 | |a Essaaidi, Mohamed |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028525426 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175511437443072 |
---|---|
any_adam_object | |
author_corporate | NATO Advanced Research Workshop on Information Assurance and Computer Security <2005, Tétouan, Morocco> |
author_corporate_role | aut |
author_facet | NATO Advanced Research Workshop on Information Assurance and Computer Security <2005, Tétouan, Morocco> |
author_sort | NATO Advanced Research Workshop on Information Assurance and Computer Security <2005, Tétouan, Morocco> |
building | Verbundindex |
bvnumber | BV043101234 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)228170469 (DE-599)BVBBV043101234 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03401nmm a2200565zcb4500</leader><controlfield tag="001">BV043101234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429467649</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-6764-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1433701529</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">1-4337-0152-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1586036785</subfield><subfield code="9">1-58603-678-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607502097</subfield><subfield code="9">1-60750-209-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429467643</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-6764-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781433701528</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">978-1-4337-0152-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781586036782</subfield><subfield code="9">978-1-58603-678-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607502098</subfield><subfield code="9">978-1-60750-209-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228170469</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043101234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on Information Assurance and Computer Security <2005, Tétouan, Morocco></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information assurance and computer security</subfield><subfield code="c">edited by Johnson P. Thomas and Mohamed Essaaidi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">©2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 205 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO security through science series</subfield><subfield code="v">v. 6</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--Title page verso. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and author index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title page; Preface; Contents; Theory; Tools; Architecture; Applications; Author Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thomas, Johnson P.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Essaaidi, Mohamed</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028525426</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043101234 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:27Z |
institution | BVB |
isbn | 1429467649 1433701529 1586036785 1607502097 9781429467643 9781433701528 9781586036782 9781607502098 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028525426 |
oclc_num | 228170469 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (viii, 205 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | IOS Press |
record_format | marc |
series2 | NATO security through science series |
spelling | NATO Advanced Research Workshop on Information Assurance and Computer Security <2005, Tétouan, Morocco> Verfasser aut Information assurance and computer security edited by Johnson P. Thomas and Mohamed Essaaidi Amsterdam IOS Press ©2006 1 Online-Ressource (viii, 205 pages) txt rdacontent c rdamedia cr rdacarrier NATO security through science series v. 6 "Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--Title page verso. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references and author index Title page; Preface; Contents; Theory; Tools; Architecture; Applications; Author Index Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Computer security Data protection Thomas, Johnson P. Sonstige oth Essaaidi, Mohamed Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946 Aggregator Volltext |
spellingShingle | Information assurance and computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Computer security Data protection |
title | Information assurance and computer security |
title_auth | Information assurance and computer security |
title_exact_search | Information assurance and computer security |
title_full | Information assurance and computer security edited by Johnson P. Thomas and Mohamed Essaaidi |
title_fullStr | Information assurance and computer security edited by Johnson P. Thomas and Mohamed Essaaidi |
title_full_unstemmed | Information assurance and computer security edited by Johnson P. Thomas and Mohamed Essaaidi |
title_short | Information assurance and computer security |
title_sort | information assurance and computer security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Computer security Data protection |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Data protection |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187946 |
work_keys_str_mv | AT natoadvancedresearchworkshoponinformationassuranceandcomputersecurity2005tetouanmorocco informationassuranceandcomputersecurity AT thomasjohnsonp informationassuranceandcomputersecurity AT essaaidimohamed informationassuranceandcomputersecurity |