Security in fixed and wireless networks:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English German |
Veröffentlicht: |
Chichester, West Sussex
Wiley
[2016]
|
Ausgabe: | 2nd edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | xvii, 600 Seiten Illustrationen, Diagramme |
ISBN: | 9781119040743 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043474368 | ||
003 | DE-604 | ||
005 | 20170111 | ||
007 | t | ||
008 | 160322s2016 xxka||| |||| 00||| eng d | ||
010 | |a 015034626 | ||
020 | |a 9781119040743 |c cloth |9 978-1-119-04074-3 | ||
035 | |a (OCoLC)960903806 | ||
035 | |a (DE-599)BVBBV043474368 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 1 | |a eng |h ger | |
044 | |a xxk |c GB | ||
049 | |a DE-11 |a DE-703 |a DE-355 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Schäfer, Günter |d 1968- |e Verfasser |0 (DE-588)133950875 |4 aut | |
240 | 1 | 0 | |a Netzsicherheit |
245 | 1 | 0 | |a Security in fixed and wireless networks |c Guenter Schaefer and Michael Rossberg (Technische Universitaet Ilmenau, Germany) |
250 | |a 2nd edition | ||
264 | 1 | |a Chichester, West Sussex |b Wiley |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a xvii, 600 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a TCP/IP |0 (DE-588)4197538-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Firewall |0 (DE-588)4386332-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Telekommunikation |0 (DE-588)4341131-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 1 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | 2 | |a Firewall |0 (DE-588)4386332-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 2 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Mobile Telekommunikation |0 (DE-588)4341131-9 |D s |
689 | 4 | 1 | |a TCP/IP |0 (DE-588)4197538-8 |D s |
689 | 4 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 4 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 4 | |8 2\p |5 DE-604 | |
689 | 5 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 5 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 5 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 5 | |8 3\p |5 DE-604 | |
700 | 1 | |a Roßberg, Michael |d 1981- |e Verfasser |0 (DE-588)1013469062 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-028891281 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176093746298880 |
---|---|
adam_text | V
Contents
D
About the authors....................................... xiii
Preface to the second edition........................... xv
Preface to the first edition............................ xvii
I Foundations of Data Security Technology 1
1 Introduction........................................ 3
1.1 Content and Structure of this Book.................. 4
1.2 Threats and Security Goals.......................... 6
1.3 Network Security Analysis .......................... 9
1.4 Information Security Measures ..................... 13
1.5 Important Terms Relating to Communication Security 14
2 Fundamentals of Cryptology......................... 17
2.1 Cryptology, Cryptography and Cryptanalysis......... 17
2.2 Classification of Cryptographic Algorithms......... 18
2.3 Cryptanalysis...................................... 19
2.4 Estimating the Effort Needed for Cryptographic
Analysis........................................... 21
2.5 Characteristics and Classification of Encryption
Algorithms......................................... 23
2.6 Key Management..................................... 25
2.7 Summary............................................ 27
2.8 Supplemental Reading............................... 28
2.9 Questions.......................................... 29
3 Symmetric Cryptography............................. 31
3.1 Encryption Modes of Block Ciphers.................. 31
3.2 Data Encryption Standard........................... 37
3.3 Advanced Encryption Standard....................... 43
3.4 RC4 Algorithm...................................... 48
vi
Contents
3.5 The KASUMI algorithm.................................. 51
3.6 Summary............................................... 53
3.7 Supplemental Reading . . ............................. 54
3.8 Questions............................................ 55
4 Asymmetric Cryptography............................. 57
4.1 Basic Idea of Asymmetric Cryptography................. 57
4.2 Mathematical Principles .............................. 60
4.3 The RSA Algorithm..................................... 69
4.4 The Problem of the Discrete Logarithm................. 71
4.5 The Diffie-Hellman Key Exchange Algorithm............. 75
4.6 The ElGamal Algorithm................................. 77
4.7 Security of Conventional Asymmetric Cryptographic
Schemes.............................................. 80
4.8 Principles of Cryptography Based on Elliptic Curves .. 81
4.9 Summary............................................... 93
4.10 Supplemental Reading............................. 94
4.11 Questions............................................. 95
5 Cryptographic Check Values............................ 97
5.1 Requirements and Classification....................... 97
5.2 Modification Detection Codes ......................... 99
5.3 Message Authentication Codes......................... 112
5.4 Message Authentication Codes Based on MDCs .......... 116
5.5 Authenticated Encryption............................. 117
5.6 Summary............................................. 121
5.7 Supplemental Reading................................. 122
5.8 Questions.......................................... 123
6 Random Number Generation............................. 125
6.1 Random Numbers and Pseudo-Random Numbers........ 125
6.2 Cryptographically Secure Random Numbers........ 126
6.3 Statistical Tests for Random Numbers................. 128
6.4 Generation of Random Numbers......................... 129
6.5 Generating Secure Pseudo-Random Numbers.............. 130
6.6 Implementation Security.............................. 133
6.7 Summary.............................................. 134
6.8 Supplemental Reading................................. 135
6.9 Questions............................................ 136
Contents
VII
7 Cryptographic Protocols.......................... 137
7.1 Properties and Notation of Cryptographic Protocols ... 137
7.2 Data Origin and Entity Authentication............ 139
7.3 Needham-Schroeder Protocol....................... 143
7.4 Kerberos......................................... 147
7.5 International Standard X.509..................... 155
7.6 Security of Negotiated Session Keys.............. 160
7.7 Advanced Password Authentication Methods......... 161
7.8 Formal Validation of Cryptographic Protocols .... 166
7.9 Summary.......................................... 176
7.10 Supplemental Reading............................. 177
7.11 Questions........................................ 178
8 Secure Group Communication*...................... 179
8.1 Specific Requirements for Secure Group
Communication.................................... 179
8.2 Negotiation of Group Keys ....................... 181
8.3 Source Authentication............................ 189
8.4 Summary.......................................... 193
8.5 Supplemental Reading............................. 194
8.6 Questions...................................... 194
9 Access Control................................... 197
9.1 Definition of Terms and Concepts ................ 197
9.2 Security Labels.................................. 199
9.3 Specification of Access Control Policies..........201
9.4 Categories of Access Control Mechanisms...........202
9.5 Summary...........................................204
9.6 Supplemental Reading............................. 204
9.7 Questions.........................................205
II Network Security 207
*
10 Integration of Security Services in Communication
Architectures......................................209
10.1 Motivation.........................................209
10.2 A Pragmatic Model ................................ 211
10.3 General Considerations for the Placement of Security
Services.......................................... 213
10.4 Integration in Lower Protocol Layers vs Applications . 216
10.5 Integration into End Systems or Intermediate Systems 21 7
10.6 Summary........................................... 219
viii
Contents
10.7 Supplemental Reading............................... 219
10.8 Questions.......................................... 219
11 Link Layer Security Protocols...................... 221
11.1 Virtual Separation of Data Traffic with IEEE 802. IQ . 222
11.2 Securing a Local Network Infrastructure Using IEEE
802.IX............................................. 224
11.3 Encryption of Data Traffic with IEEE 802.1AE....... 226
11.4 Point-to-Point Protocol............................ 228
11.5 Point-to-Point Tunneling Protocol.................. 236
11.6 Virtual Private Networks........................... 242
11.7 Summary............................................ 243
11.8 Supplemental Reading.............................. 245
11.9 Questions.......................................... 246
12 IPsec Security Architecture........................ 249
12.1 Short Introduction to the Internet Protocol Suite..249
12.2 Overview of the IPsec Architecture................. 253
12.3 Use of Transport and Tunnel Modes.................. 261
12.4 IPsec Protocol Processing.......................... 263
12.5 The ESP Protocol................................... 267
12.6 The AH Protocol.............. ..................... 273
12.7 The ISAKMP Protocol................................ 279
12.8 Internet Key Exchange Version 1.................... 286
12.9 Internet Key Exchange Version 2.................... 293
12.10 Other Aspects of IPsec............................. 297
12.11 Summary............................................ 299
12.12 Supplemental Reading............................... 300
12.13 Questions.......................................... 301
13 Transport Layer Security Protocols................. 303
13.1 Secure Socket Layer................................ 303
13.2 Transport Layer Security........................... 315
13.3 Datagram Transport Layer Security.................. 322
13.4 Secure Shell....................................... 323
13.5 Summary............................................ 332
13.6 Supplemental Reading .............................. 333
13.7 Questions.......................................... 334
Contents
IX
14 Security Aspects of Mobile Communication........337
14.1 Threats in Mobile Communication Networks....... 337
14.2 Protecting Location Confidentiality............ 338
14.3 Summary........................................ 343
14.4 Supplemental Reading........................... 343
14.5 Questions...................................... 343
15 Security in Wireless Local Area Networks........345
15.1 The IEEE 802.11 Standard for WLANs............. 345
15.2 Entity Authentication.......................... 347
15.3 Wired Equivalent Privacy....................... 353
15.4 Robust Secure Networks ........................ 358
15.5 Security in Public WLANs....................... 365
15.6 Summary........................................ 367
15.7 Supplemental Reading........................... 368
15.8 Questions...................................... 369
16 Security in Mobile Wide-Area Networks...........371
16.1 Global System for Mobile Communication......... 371
16.2 Universal Mobile Telecommunications System .... 378
16.3 Long-Term Evolution............................ 385
16.4 Summary........................................ 389
16.5 Supplemental Reading........................... 390
16.6 Questions...................................... 391
IV Protecting Communications
Infrastructures -J* if é-J- ï ■
ms
17 Protecting Communications and Infrastructure in Open
Networks....................................... 395
17.1 Systematic Threat Analysis...................... 396
17.2 Security of End Systems......................... 399
17.3 Summary......................................... 411
17.4 Supplemental Reading............................ 411
17.5 Questions....................................... 412
X
Contents
18 Availability of Data Transport.................... 413
18.1 Denial-of-Service Attacks.......................... 413
18.2 Distributed Denial-of-Service Attacks ............. 420
18.3 Countermeasures.................................... 422
18.4 Summary............................................ 433
18.5 Supplemental Reading............................... 434
18.6 Questions.......................................... 435
19 Routing Security....................................437
19.1 Cryptographic Protection of BGP................... 441
19.2 Identification of Routing Anomalies* .............. 450
19.3 Summary............................................ 455
19.4 Supplemental Reading............................... 456
19.5 Questions.......................................... 457
20 Secure Name Resolution............................. 459
20.1 The DNS Operating Principle........................ 459
20.2 Security Objectives and Threats................... 461
20.3 Secure Use of Traditional DNS...................... 467
20.4 Cryptographic Protection of DNS.................... 469
20.5 Summary........................................... 481
20.6 Supplemental Reading............................... 482
20.7 Questions.......................................... 483
21 Internet Firewalls................................. 485
21.1 Tasks and Basic Principles of Firewalls............ 485
21.2 Firewall-Relevant Internet Services and Protocols .... 487
21.3 Terminology and Building Blocks.................... 490
21.4 Firewall Architectures ............................ 491
21.5 Packet Filtering................................... 495
21.6 Bastion Hosts and Proxy Servers.................... 500
21.7 Other Aspects of Modern Firewall Systems........... 502
21.8 Summary............................................ 503
21.9 Supplemental Reading............................... 504
21.10 Questions.......................................... 505
22 Automated Attack Detection and Response............ 507
22.1 Operating Principle and Objectives of Intrusion
Detection Systems................................. 508
22.2 Design and operation of network-based IDSs......... 512
22.3 Response to Attacks and Automatic prevention....... 521
22.4 Techniques for Evading NIDSs....................... 524
22.5 Summary.......................................... 526
22.6 Supplemental Reading............................... 527
Contents
xi
22.7 Questions............................................ 528
23 Management of Complex Communication Infrastructures* 529
23.1 Automatic Certificate Management..................... 529
23.2 Automatic VPN Configuration.......................... 536
23.3 Summary.............................................. 550
23.4 Supplemental Reading................................. 552
23.5 Questions............................................ 554
Bibliography ...............................................555
Abbreviations ..............................................585
Index...................................................... 595
Security in Fixed and
Wireless Networks
2nd Edition
Guenter Schaefer and Michael Rossberg
Technische Universitoet llmenau, Germany
One of the most complete technical network security books available, this
welcome second edition provides a firm introduction to the field, covering the
basics of data security technologies and explaining in depth how they are applied
in communication networks. The authors provide a self-contained introduction
to network security suitable for both undergraduate and graduate students of
computer science, electrical engineering and telecommunications with a basic
knowledge of data and telecommunication networks. The main benefit for the
reader is the overview of the basics of information security without the requirement
of a cryptography background. There follows a focused and thorough introduction
to the principles of network security, taking dominating network protocols such as
the Internet Protocol suite. Wireless LANs (IEEE 802.11), GSM and UMTS as examples.
The first edition of this book focused on protection of information during transport
in the network, and in this edition there is a new section on protecting large-scale
communication infrastructures against threats targeted at the availability and
correct/secure functioning of the network itself. All material in the book has been
revised and updated to cover current state-of-the-art developments.
• Introduces sections on security threats and their countermeasures in
both fixed and wireless networks, advising on how countermeasures
can provide secure communication infrastructures.
• Enables the reader to understand the risks of inappropriate network
security, what mechanisms and protocols can be deployed to
counter these risks, and how these mechanisms and protocols work.
• Introduces network security using IP, wireless LAN, UMTS and GSM,
providing technical methods to protect IP-based large-scale
communication infrastructures against security threats such as denial
of service attacks.
The accompanying website (http://network-security-book.de/en) includes tutorial
slides to enhance the learning experience.
ISBN 978-1-119-04074-3
|
any_adam_object | 1 |
author | Schäfer, Günter 1968- Roßberg, Michael 1981- |
author_GND | (DE-588)133950875 (DE-588)1013469062 |
author_facet | Schäfer, Günter 1968- Roßberg, Michael 1981- |
author_role | aut aut |
author_sort | Schäfer, Günter 1968- |
author_variant | g s gs m r mr |
building | Verbundindex |
bvnumber | BV043474368 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 273 ST 276 ST 277 |
ctrlnum | (OCoLC)960903806 (DE-599)BVBBV043474368 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04086nam a2200913 c 4500</leader><controlfield tag="001">BV043474368</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170111 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160322s2016 xxka||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">015034626</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119040743</subfield><subfield code="c">cloth</subfield><subfield code="9">978-1-119-04074-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960903806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043474368</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="1" ind2=" "><subfield code="a">eng</subfield><subfield code="h">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schäfer, Günter</subfield><subfield code="d">1968-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)133950875</subfield><subfield code="4">aut</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Netzsicherheit</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in fixed and wireless networks</subfield><subfield code="c">Guenter Schaefer and Michael Rossberg (Technische Universitaet Ilmenau, Germany)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, West Sussex</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 600 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Roßberg, Michael</subfield><subfield code="d">1981-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1013469062</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028891281</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV043474368 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:26:42Z |
institution | BVB |
isbn | 9781119040743 |
language | English German |
lccn | 015034626 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028891281 |
oclc_num | 960903806 |
open_access_boolean | |
owner | DE-11 DE-703 DE-355 DE-BY-UBR |
owner_facet | DE-11 DE-703 DE-355 DE-BY-UBR |
physical | xvii, 600 Seiten Illustrationen, Diagramme |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Wiley |
record_format | marc |
spelling | Schäfer, Günter 1968- Verfasser (DE-588)133950875 aut Netzsicherheit Security in fixed and wireless networks Guenter Schaefer and Michael Rossberg (Technische Universitaet Ilmenau, Germany) 2nd edition Chichester, West Sussex Wiley [2016] © 2016 xvii, 600 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Wireless communication systems Security measures Computer security Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf TCP/IP (DE-588)4197538-8 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Firewall (DE-588)4386332-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Mobile Telekommunikation (DE-588)4341131-9 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf 1\p (DE-588)4123623-3 Lehrbuch gnd-content Computersicherheit (DE-588)4274324-2 s Netzwerk (DE-588)4171529-9 s Kryptologie (DE-588)4033329-2 s DE-604 Sicherheit (DE-588)4054790-5 s Firewall (DE-588)4386332-2 s Drahtloses lokales Netz (DE-588)4633975-9 s Rechnernetz (DE-588)4070085-9 s Eindringerkennung (DE-588)4706627-1 s Mobile Telekommunikation (DE-588)4341131-9 s TCP/IP (DE-588)4197538-8 s Datensicherung (DE-588)4011144-1 s 2\p DE-604 3\p DE-604 Roßberg, Michael 1981- Verfasser (DE-588)1013469062 aut Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Bayreuth - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Schäfer, Günter 1968- Roßberg, Michael 1981- Security in fixed and wireless networks Computer networks Security measures Wireless communication systems Security measures Computer security Drahtloses lokales Netz (DE-588)4633975-9 gnd TCP/IP (DE-588)4197538-8 gnd Eindringerkennung (DE-588)4706627-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Firewall (DE-588)4386332-2 gnd Rechnernetz (DE-588)4070085-9 gnd Mobile Telekommunikation (DE-588)4341131-9 gnd Netzwerk (DE-588)4171529-9 gnd |
subject_GND | (DE-588)4633975-9 (DE-588)4197538-8 (DE-588)4706627-1 (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4274324-2 (DE-588)4054790-5 (DE-588)4386332-2 (DE-588)4070085-9 (DE-588)4341131-9 (DE-588)4171529-9 (DE-588)4123623-3 |
title | Security in fixed and wireless networks |
title_alt | Netzsicherheit |
title_auth | Security in fixed and wireless networks |
title_exact_search | Security in fixed and wireless networks |
title_full | Security in fixed and wireless networks Guenter Schaefer and Michael Rossberg (Technische Universitaet Ilmenau, Germany) |
title_fullStr | Security in fixed and wireless networks Guenter Schaefer and Michael Rossberg (Technische Universitaet Ilmenau, Germany) |
title_full_unstemmed | Security in fixed and wireless networks Guenter Schaefer and Michael Rossberg (Technische Universitaet Ilmenau, Germany) |
title_short | Security in fixed and wireless networks |
title_sort | security in fixed and wireless networks |
topic | Computer networks Security measures Wireless communication systems Security measures Computer security Drahtloses lokales Netz (DE-588)4633975-9 gnd TCP/IP (DE-588)4197538-8 gnd Eindringerkennung (DE-588)4706627-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Firewall (DE-588)4386332-2 gnd Rechnernetz (DE-588)4070085-9 gnd Mobile Telekommunikation (DE-588)4341131-9 gnd Netzwerk (DE-588)4171529-9 gnd |
topic_facet | Computer networks Security measures Wireless communication systems Security measures Computer security Drahtloses lokales Netz TCP/IP Eindringerkennung Datensicherung Kryptologie Computersicherheit Sicherheit Firewall Rechnernetz Mobile Telekommunikation Netzwerk Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028891281&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT schafergunter netzsicherheit AT roßbergmichael netzsicherheit AT schafergunter securityinfixedandwirelessnetworks AT roßbergmichael securityinfixedandwirelessnetworks |