Security technologies for the World Wide Web:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Artech House
©2000
|
Schriftenreihe: | Artech House computer security series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Artech House computing library.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references and index Internet -- - WWW -- - Vulnerabilities, threats, and countermeasures -- - Generic security model -- - Security policy -- - Host security -- - Network security -- - Organizational security -- - Legal security -- - HTTP Security -- - HTTP -- - User authentication, authorization, and access control -- - Basic authentication -- - Digest access authentication -- - Certificate-based authentication -- - Sever configuration -- - Configuring HTTP basic authentication -- - Configuring HTTP digest access authentication -- - Proxy Servers and Firewalls -- - Static packet filtering -- - Dynamic packet filtering or stateful inspection -- - Circuit-level gateways -- - Application-level gateways -- - Firewall configurations -- - Dual-homed firewall -- - Screened host firewall -- - Screened subnet firewall -- - Network address translation -- - Configuring the browser -- - Cryptographic Techniques -- - Cryptographic hash functions -- - Secret key cryptography -- - DES -- - Triple-DES -- - IDEA -- - SAFER -- - Blowfish -- - CAST-128 -- - RC2, RC4, RC5, and RC6 -- - AES -- - Public key cryptography -- - RSA -- - Diffie-Hellman -- - ElGamal -- - DSS -- - ECC -- - Digital envelopes -- - Protection of cryptographic keys -- - Generation of pseudorandom bit sequences -- - Legal issues -- - Patent claims -- - Regulations -- - Electronic and digital signature legislation -- - Internet Security Protocols -- - Network access layer security protocols -- - Layer 2 Forwarding Protocol -- - Point-to-Point Tunneling Protocol -- - Layer 2 Tunneling Protocol -- - Virtual private networking -- - Internet layer security protocols -- - IP security architecture |
Beschreibung: | 1 Online-Ressource (xxi, 419 pages) |
ISBN: | 0585337659 1580530451 9780585337654 9781580530453 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043145861 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2000 |||| o||u| ||||||eng d | ||
020 | |a 0585337659 |c electronic bk. |9 0-585-33765-9 | ||
020 | |a 1580530451 |c alk. paper |9 1-58053-045-1 | ||
020 | |a 9780585337654 |c electronic bk. |9 978-0-585-33765-4 | ||
020 | |a 9781580530453 |c alk. paper |9 978-1-58053-045-3 | ||
035 | |a (OCoLC)45843371 | ||
035 | |a (DE-599)BVBBV043145861 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Oppliger, Rolf |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security technologies for the World Wide Web |c Rolf Oppliger |
264 | 1 | |a Boston, MA |b Artech House |c ©2000 | |
300 | |a 1 Online-Ressource (xxi, 419 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House computer security series | |
500 | |a "Artech House computing library.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Internet -- - WWW -- - Vulnerabilities, threats, and countermeasures -- - Generic security model -- - Security policy -- - Host security -- - Network security -- - Organizational security -- - Legal security -- - HTTP Security -- - HTTP -- - User authentication, authorization, and access control -- - Basic authentication -- - Digest access authentication -- - Certificate-based authentication -- - Sever configuration -- - Configuring HTTP basic authentication -- - Configuring HTTP digest access authentication -- - Proxy Servers and Firewalls -- - Static packet filtering -- - Dynamic packet filtering or stateful inspection -- - Circuit-level gateways -- - Application-level gateways -- - Firewall configurations -- - Dual-homed firewall -- - Screened host firewall -- - Screened subnet firewall -- - Network address translation -- - Configuring the browser -- - Cryptographic Techniques -- - Cryptographic hash functions -- - Secret key cryptography -- - DES -- - Triple-DES -- - IDEA -- - SAFER -- - Blowfish -- - CAST-128 -- - RC2, RC4, RC5, and RC6 -- - AES -- - Public key cryptography -- - RSA -- - Diffie-Hellman -- - ElGamal -- - DSS -- - ECC -- - Digital envelopes -- - Protection of cryptographic keys -- - Generation of pseudorandom bit sequences -- - Legal issues -- - Patent claims -- - Regulations -- - Electronic and digital signature legislation -- - Internet Security Protocols -- - Network access layer security protocols -- - Layer 2 Forwarding Protocol -- - Point-to-Point Tunneling Protocol -- - Layer 2 Tunneling Protocol -- - Virtual private networking -- - Internet layer security protocols -- - IP security architecture | ||
650 | 4 | |a World Wide Web / Security measures | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a World Wide Web / Security measures |2 fast | |
650 | 7 | |a World wide web |2 gtt | |
650 | 7 | |a Beveiliging |2 gtt | |
650 | 4 | |a Computer security | |
650 | 4 | |a World Wide Web |x Security measures | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028570052 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175600021143552 |
---|---|
any_adam_object | |
author | Oppliger, Rolf |
author_facet | Oppliger, Rolf |
author_role | aut |
author_sort | Oppliger, Rolf |
author_variant | r o ro |
building | Verbundindex |
bvnumber | BV043145861 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)45843371 (DE-599)BVBBV043145861 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03927nmm a2200517zc 4500</leader><controlfield tag="001">BV043145861</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585337659</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-585-33765-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580530451</subfield><subfield code="c">alk. paper</subfield><subfield code="9">1-58053-045-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585337654</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-585-33765-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580530453</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-1-58053-045-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)45843371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043145861</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oppliger, Rolf</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security technologies for the World Wide Web</subfield><subfield code="c">Rolf Oppliger</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Artech House</subfield><subfield code="c">©2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 419 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Artech House computing library.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Internet -- - WWW -- - Vulnerabilities, threats, and countermeasures -- - Generic security model -- - Security policy -- - Host security -- - Network security -- - Organizational security -- - Legal security -- - HTTP Security -- - HTTP -- - User authentication, authorization, and access control -- - Basic authentication -- - Digest access authentication -- - Certificate-based authentication -- - Sever configuration -- - Configuring HTTP basic authentication -- - Configuring HTTP digest access authentication -- - Proxy Servers and Firewalls -- - Static packet filtering -- - Dynamic packet filtering or stateful inspection -- - Circuit-level gateways -- - Application-level gateways -- - Firewall configurations -- - Dual-homed firewall -- - Screened host firewall -- - Screened subnet firewall -- - Network address translation -- - Configuring the browser -- - Cryptographic Techniques -- - Cryptographic hash functions -- - Secret key cryptography -- - DES -- - Triple-DES -- - IDEA -- - SAFER -- - Blowfish -- - CAST-128 -- - RC2, RC4, RC5, and RC6 -- - AES -- - Public key cryptography -- - RSA -- - Diffie-Hellman -- - ElGamal -- - DSS -- - ECC -- - Digital envelopes -- - Protection of cryptographic keys -- - Generation of pseudorandom bit sequences -- - Legal issues -- - Patent claims -- - Regulations -- - Electronic and digital signature legislation -- - Internet Security Protocols -- - Network access layer security protocols -- - Layer 2 Forwarding Protocol -- - Point-to-Point Tunneling Protocol -- - Layer 2 Tunneling Protocol -- - Virtual private networking -- - Internet layer security protocols -- - IP security architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World Wide Web / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">World Wide Web / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">World wide web</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World Wide Web</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028570052</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043145861 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:51Z |
institution | BVB |
isbn | 0585337659 1580530451 9780585337654 9781580530453 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028570052 |
oclc_num | 45843371 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxi, 419 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Artech House |
record_format | marc |
series2 | Artech House computer security series |
spelling | Oppliger, Rolf Verfasser aut Security technologies for the World Wide Web Rolf Oppliger Boston, MA Artech House ©2000 1 Online-Ressource (xxi, 419 pages) txt rdacontent c rdamedia cr rdacarrier Artech House computer security series "Artech House computing library.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references and index Internet -- - WWW -- - Vulnerabilities, threats, and countermeasures -- - Generic security model -- - Security policy -- - Host security -- - Network security -- - Organizational security -- - Legal security -- - HTTP Security -- - HTTP -- - User authentication, authorization, and access control -- - Basic authentication -- - Digest access authentication -- - Certificate-based authentication -- - Sever configuration -- - Configuring HTTP basic authentication -- - Configuring HTTP digest access authentication -- - Proxy Servers and Firewalls -- - Static packet filtering -- - Dynamic packet filtering or stateful inspection -- - Circuit-level gateways -- - Application-level gateways -- - Firewall configurations -- - Dual-homed firewall -- - Screened host firewall -- - Screened subnet firewall -- - Network address translation -- - Configuring the browser -- - Cryptographic Techniques -- - Cryptographic hash functions -- - Secret key cryptography -- - DES -- - Triple-DES -- - IDEA -- - SAFER -- - Blowfish -- - CAST-128 -- - RC2, RC4, RC5, and RC6 -- - AES -- - Public key cryptography -- - RSA -- - Diffie-Hellman -- - ElGamal -- - DSS -- - ECC -- - Digital envelopes -- - Protection of cryptographic keys -- - Generation of pseudorandom bit sequences -- - Legal issues -- - Patent claims -- - Regulations -- - Electronic and digital signature legislation -- - Internet Security Protocols -- - Network access layer security protocols -- - Layer 2 Forwarding Protocol -- - Point-to-Point Tunneling Protocol -- - Layer 2 Tunneling Protocol -- - Virtual private networking -- - Internet layer security protocols -- - IP security architecture World Wide Web / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast World Wide Web / Security measures fast World wide web gtt Beveiliging gtt Computer security World Wide Web Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390 Aggregator Volltext |
spellingShingle | Oppliger, Rolf Security technologies for the World Wide Web World Wide Web / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast World Wide Web / Security measures fast World wide web gtt Beveiliging gtt Computer security World Wide Web Security measures |
title | Security technologies for the World Wide Web |
title_auth | Security technologies for the World Wide Web |
title_exact_search | Security technologies for the World Wide Web |
title_full | Security technologies for the World Wide Web Rolf Oppliger |
title_fullStr | Security technologies for the World Wide Web Rolf Oppliger |
title_full_unstemmed | Security technologies for the World Wide Web Rolf Oppliger |
title_short | Security technologies for the World Wide Web |
title_sort | security technologies for the world wide web |
topic | World Wide Web / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast World Wide Web / Security measures fast World wide web gtt Beveiliging gtt Computer security World Wide Web Security measures |
topic_facet | World Wide Web / Security measures COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security World wide web Beveiliging World Wide Web Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=42390 |
work_keys_str_mv | AT oppligerrolf securitytechnologiesfortheworldwideweb |