Secure computer and network systems: modeling, analysis and design
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chichester, England
J. Wiley & Sons
c2008
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Secure Computer and Network Systems; Contents; Preface; Part I An Overview of Computer and Network Security; 1 Assets, Vulnerabilities and Threats of Computer and Network Systems; 2 Protection of Computer and Network Systems; Part II Secure System Architecture and Design; 3 Asset Protection-Driven, Policy-Based Security Protection Architecture; 4 Job Admission Control for Service Stability; 5 Job Scheduling Methods for Service Differentiation and Service Stability; 6 Job Reservation and Service Protocols for End-To-End Delay Guarantee Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.¡. This book presents quantitative modeling and an |
Beschreibung: | 1 Online-Ressource (xvii, 336 p.) |
ISBN: | 0470023252 9780470023259 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043152005 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 0470023252 |c electronic bk. |9 0-470-02325-2 | ||
020 | |a 9780470023259 |c electronic bk. |9 978-0-470-02325-9 | ||
035 | |a (OCoLC)608622648 | ||
035 | |a (DE-599)BVBBV043152005 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Ye, Nong |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure computer and network systems |b modeling, analysis and design |c Nong Ye |
264 | 1 | |a Chichester, England |b J. Wiley & Sons |c c2008 | |
300 | |a 1 Online-Ressource (xvii, 336 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Secure Computer and Network Systems; Contents; Preface; Part I An Overview of Computer and Network Security; 1 Assets, Vulnerabilities and Threats of Computer and Network Systems; 2 Protection of Computer and Network Systems; Part II Secure System Architecture and Design; 3 Asset Protection-Driven, Policy-Based Security Protection Architecture; 4 Job Admission Control for Service Stability; 5 Job Scheduling Methods for Service Differentiation and Service Stability; 6 Job Reservation and Service Protocols for End-To-End Delay Guarantee | ||
500 | |a Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.¡. This book presents quantitative modeling and an | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Design and construction |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Design and construction | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 0-470-02324-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-470-02324-2 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028576196 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175612832645120 |
---|---|
any_adam_object | |
author | Ye, Nong |
author_facet | Ye, Nong |
author_role | aut |
author_sort | Ye, Nong |
author_variant | n y ny |
building | Verbundindex |
bvnumber | BV043152005 |
classification_rvk | ST 200 ST 277 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)608622648 (DE-599)BVBBV043152005 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03664nmm a2200589zc 4500</leader><controlfield tag="001">BV043152005</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470023252</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-02325-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470023259</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-02325-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)608622648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043152005</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ye, Nong</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure computer and network systems</subfield><subfield code="b">modeling, analysis and design</subfield><subfield code="c">Nong Ye</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, England</subfield><subfield code="b">J. Wiley & Sons</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 336 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Secure Computer and Network Systems; Contents; Preface; Part I An Overview of Computer and Network Security; 1 Assets, Vulnerabilities and Threats of Computer and Network Systems; 2 Protection of Computer and Network Systems; Part II Secure System Architecture and Design; 3 Asset Protection-Driven, Policy-Based Security Protection Architecture; 4 Job Admission Control for Service Stability; 5 Job Scheduling Methods for Service Differentiation and Service Stability; 6 Job Reservation and Service Protocols for End-To-End Delay Guarantee</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.¡. This book presents quantitative modeling and an</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Design and construction</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Design and construction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">0-470-02324-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-470-02324-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028576196</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043152005 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:04Z |
institution | BVB |
isbn | 0470023252 9780470023259 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028576196 |
oclc_num | 608622648 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xvii, 336 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | J. Wiley & Sons |
record_format | marc |
spelling | Ye, Nong Verfasser aut Secure computer and network systems modeling, analysis and design Nong Ye Chichester, England J. Wiley & Sons c2008 1 Online-Ressource (xvii, 336 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Secure Computer and Network Systems; Contents; Preface; Part I An Overview of Computer and Network Security; 1 Assets, Vulnerabilities and Threats of Computer and Network Systems; 2 Protection of Computer and Network Systems; Part II Secure System Architecture and Design; 3 Asset Protection-Driven, Policy-Based Security Protection Architecture; 4 Job Admission Control for Service Stability; 5 Job Scheduling Methods for Service Differentiation and Service Stability; 6 Job Reservation and Service Protocols for End-To-End Delay Guarantee Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.¡. This book presents quantitative modeling and an COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Design and construction fast Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer networks Design and construction Computer security Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Erscheint auch als Druck-Ausgabe, Paperback 0-470-02324-4 Erscheint auch als Druck-Ausgabe, Paperback 978-0-470-02324-2 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Ye, Nong Secure computer and network systems modeling, analysis and design COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Design and construction fast Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer networks Design and construction Computer security Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 |
title | Secure computer and network systems modeling, analysis and design |
title_auth | Secure computer and network systems modeling, analysis and design |
title_exact_search | Secure computer and network systems modeling, analysis and design |
title_full | Secure computer and network systems modeling, analysis and design Nong Ye |
title_fullStr | Secure computer and network systems modeling, analysis and design Nong Ye |
title_full_unstemmed | Secure computer and network systems modeling, analysis and design Nong Ye |
title_short | Secure computer and network systems |
title_sort | secure computer and network systems modeling analysis and design |
title_sub | modeling, analysis and design |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Design and construction fast Computer networks / Security measures fast Computer security fast Computer networks Security measures Computer networks Design and construction Computer security Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Design and construction Computer networks / Security measures Computer security Computer networks Security measures Computer networks Design and construction Rechnernetz Computersicherheit |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=231423 |
work_keys_str_mv | AT yenong securecomputerandnetworksystemsmodelinganalysisanddesign |