Securing the information infrastructure:
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial" - Provided by publisher
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Cybertech Publishing
[2008]
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial" - Provided by publisher |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xiv, 368 Seiten) Illustrationen |
ISBN: | 9781599043814 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044237907 | ||
003 | DE-604 | ||
005 | 20180503 | ||
007 | cr|uuu---uuuuu | ||
008 | 170323s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781599043814 |9 978-1-59904-381-4 | ||
024 | 7 | |a 10.4018/978-1-59904-379-1 |2 doi | |
035 | |a (OCoLC)731013156 | ||
035 | |a (DE-599)BVBBV044237907 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
100 | 1 | |a Kizza, Joseph Migga |d 1950- |e Verfasser |0 (DE-588)118069020 |4 aut | |
245 | 1 | 0 | |a Securing the information infrastructure |c Joseph M. Kizza (University of Tennessee at Chattanooga, USA), Florence M. Kizza (Freelance Writer, USA) |
264 | 1 | |a Hershey ; New York |b Cybertech Publishing |c [2008] | |
264 | 4 | |c © 2008 | |
300 | |a 1 Online-Ressource (xiv, 368 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
505 | 8 | |a 1. Building trust in the information infrastructure -- 2. Need for morality and ethics -- 3. Building an ethical framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk -- 6. Network basics and securing the network infrastructure -- 7.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and authorization -- 11. Perimeter defense; the firewall -- 12. Intrusion detection and prevention systems -- 13. Security in wireless systems -- 14. Biometrics for access control -- 15. Digital evidence and computer crime -- 16. Digital crime investigation and forensics -- 17. Trends in information assurance | |
520 | |a "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial" - Provided by publisher | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Internet / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Information superhighway / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Kizza, Florence Migga |e Verfasser |0 (DE-588)1067778195 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59904-379-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59904-379-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61692-726-4 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029643338 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-379-1 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-379-1 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-379-1 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-379-1 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138439919403008 |
---|---|
adam_text | |
any_adam_object | |
author | Kizza, Joseph Migga 1950- Kizza, Florence Migga |
author_GND | (DE-588)118069020 (DE-588)1067778195 |
author_facet | Kizza, Joseph Migga 1950- Kizza, Florence Migga |
author_role | aut aut |
author_sort | Kizza, Joseph Migga 1950- |
author_variant | j m k jm jmk f m k fm fmk |
building | Verbundindex |
bvnumber | BV044237907 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. Building trust in the information infrastructure -- 2. Need for morality and ethics -- 3. Building an ethical framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk -- 6. Network basics and securing the network infrastructure -- 7.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and authorization -- 11. Perimeter defense; the firewall -- 12. Intrusion detection and prevention systems -- 13. Security in wireless systems -- 14. Biometrics for access control -- 15. Digital evidence and computer crime -- 16. Digital crime investigation and forensics -- 17. Trends in information assurance |
ctrlnum | (OCoLC)731013156 (DE-599)BVBBV044237907 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044237907</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180503</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170323s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599043814</subfield><subfield code="9">978-1-59904-381-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59904-379-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)731013156</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044237907</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kizza, Joseph Migga</subfield><subfield code="d">1950-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)118069020</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the information infrastructure</subfield><subfield code="c">Joseph M. Kizza (University of Tennessee at Chattanooga, USA), Florence M. Kizza (Freelance Writer, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Cybertech Publishing</subfield><subfield code="c">[2008]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 368 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Building trust in the information infrastructure -- 2. Need for morality and ethics -- 3. Building an ethical framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk -- 6. Network basics and securing the network infrastructure -- 7.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and authorization -- 11. Perimeter defense; the firewall -- 12. Intrusion detection and prevention systems -- 13. Security in wireless systems -- 14. Biometrics for access control -- 15. Digital evidence and computer crime -- 16. Digital crime investigation and forensics -- 17. Trends in information assurance</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information superhighway / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kizza, Florence Migga</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1067778195</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59904-379-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59904-379-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-726-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029643338</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-379-1</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-379-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-379-1</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-379-1</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044237907 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:30Z |
institution | BVB |
isbn | 9781599043814 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029643338 |
oclc_num | 731013156 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xiv, 368 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Cybertech Publishing |
record_format | marc |
spelling | Kizza, Joseph Migga 1950- Verfasser (DE-588)118069020 aut Securing the information infrastructure Joseph M. Kizza (University of Tennessee at Chattanooga, USA), Florence M. Kizza (Freelance Writer, USA) Hershey ; New York Cybertech Publishing [2008] © 2008 1 Online-Ressource (xiv, 368 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index 1. Building trust in the information infrastructure -- 2. Need for morality and ethics -- 3. Building an ethical framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk -- 6. Network basics and securing the network infrastructure -- 7.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and authorization -- 11. Perimeter defense; the firewall -- 12. Intrusion detection and prevention systems -- 13. Security in wireless systems -- 14. Biometrics for access control -- 15. Digital evidence and computer crime -- 16. Digital crime investigation and forensics -- 17. Trends in information assurance "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial" - Provided by publisher Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s DE-604 Computersicherheit (DE-588)4274324-2 s Kizza, Florence Migga Verfasser (DE-588)1067778195 aut Erscheint auch als Druck-Ausgabe 978-1-59904-379-1 Erscheint auch als Druck-Ausgabe 1-59904-379-3 Erscheint auch als Druck-Ausgabe 978-1-61692-726-4 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Kizza, Joseph Migga 1950- Kizza, Florence Migga Securing the information infrastructure 1. Building trust in the information infrastructure -- 2. Need for morality and ethics -- 3. Building an ethical framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk -- 6. Network basics and securing the network infrastructure -- 7.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and authorization -- 11. Perimeter defense; the firewall -- 12. Intrusion detection and prevention systems -- 13. Security in wireless systems -- 14. Biometrics for access control -- 15. Digital evidence and computer crime -- 16. Digital crime investigation and forensics -- 17. Trends in information assurance Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4308416-3 (DE-588)4274324-2 |
title | Securing the information infrastructure |
title_auth | Securing the information infrastructure |
title_exact_search | Securing the information infrastructure |
title_full | Securing the information infrastructure Joseph M. Kizza (University of Tennessee at Chattanooga, USA), Florence M. Kizza (Freelance Writer, USA) |
title_fullStr | Securing the information infrastructure Joseph M. Kizza (University of Tennessee at Chattanooga, USA), Florence M. Kizza (Freelance Writer, USA) |
title_full_unstemmed | Securing the information infrastructure Joseph M. Kizza (University of Tennessee at Chattanooga, USA), Florence M. Kizza (Freelance Writer, USA) |
title_short | Securing the information infrastructure |
title_sort | securing the information infrastructure |
topic | Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Cyberterrorism Internet / Security measures Computer networks / Security measures Information superhighway / Security measures Datensicherung Internet Computersicherheit |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1 |
work_keys_str_mv | AT kizzajosephmigga securingtheinformationinfrastructure AT kizzaflorencemigga securingtheinformationinfrastructure |