Network security, administration, and management: advancing technology and practice
"This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
Information Science Reference
[2011]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems"-- |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xxi, 361 Seiten) Illustrationen |
ISBN: | 9781609607784 9781609607791 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044243757 | ||
003 | DE-604 | ||
005 | 20220303 | ||
007 | cr|uuu---uuuuu | ||
008 | 170327s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781609607784 |9 978-1-60960-778-4 | ||
020 | |a 9781609607791 |c print & perpetual access |9 978-1-60960-779-1 | ||
024 | 7 | |a 10.4018/978-1-60960-777-7 |2 doi | |
035 | |a (OCoLC)1031439742 | ||
035 | |a (DE-599)BVBBV044243757 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Network security, administration, and management |b advancing technology and practice |c Dulal Chandra Kar (Texas A&M University-Corpus Christi, USA), Mahbubur Rahman Syed (Minnesota State University, Mankato, USA) |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2011] | |
264 | 4 | |c © 2011 | |
300 | |a 1 Online-Ressource (xxi, 361 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. Basic device and protocol security / Bruce Hartpence -- 2. Mitigating the blended threat: protecting data and educating users / Christophe Veltsos -- 3. Security issues for multi-domain resource reservation / Christos Bouras and Kostas Stamos -- 4. Healthcare employees and passwords: an entry point for social engineering attacks / B. Dawn Medlin, Douglas May and Ken Corley -- 5. Public key infrastructure / Reed H. Petty, Jiang Bian and Remzi Seker -- 6. Key management / Chuan-Kun Wu -- 7. Security assessment of networks / Aftab Ahmad -- 8. Network security auditing / Yin Pan, Bo Yuan and Sumita Mishra -- 9. Network manageability security / Salvador Mandujano -- 10. Security and attacks in wireless sensor networks / Murat Al and Kenji Yoshigoe -- 11. Wireless sensor networks: emerging applications and security solutions / Sumita Mishra -- 12. Privacy preserving data gathering in wireless sensor network / Md. Golam Kaosar and Xun Yi -- 13. BANBAD: a centralized anomaly detection technique for ad hoc networks / Rajeev Agrawal, Chaoli Cai, Ajay Gupta, Rajib Paul and Raed Salih -- 14. Data regulation protocol for source-end mitigation of distributed denial of service / Nirav Shah and Dijiang Huang -- 15. Instant messaging security / Zhijun Liu, Guoqiang Shu and David Lee | |
520 | |a "This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems"-- | ||
650 | 4 | |a Computer networks / Management | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Technologie |0 (DE-588)4059276-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datennetz |0 (DE-588)4011130-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Datennetz |0 (DE-588)4011130-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Technologie |0 (DE-588)4059276-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kar, Dulal Chandra |0 (DE-588)1128625741 |4 edt | |
700 | 1 | |a Syed, Mahbubur Rahman |d 1952- |0 (DE-588)140908358 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-60960-777-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-60960-777-5 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-777-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029649043 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-777-7 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-777-7 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-777-7 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-777-7 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-777-7 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138439951908864 |
---|---|
adam_text | |
any_adam_object | |
author2 | Kar, Dulal Chandra Syed, Mahbubur Rahman 1952- |
author2_role | edt edt |
author2_variant | d c k dc dck m r s mr mrs |
author_GND | (DE-588)1128625741 (DE-588)140908358 |
author_facet | Kar, Dulal Chandra Syed, Mahbubur Rahman 1952- |
building | Verbundindex |
bvnumber | BV044243757 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. Basic device and protocol security / Bruce Hartpence -- 2. Mitigating the blended threat: protecting data and educating users / Christophe Veltsos -- 3. Security issues for multi-domain resource reservation / Christos Bouras and Kostas Stamos -- 4. Healthcare employees and passwords: an entry point for social engineering attacks / B. Dawn Medlin, Douglas May and Ken Corley -- 5. Public key infrastructure / Reed H. Petty, Jiang Bian and Remzi Seker -- 6. Key management / Chuan-Kun Wu -- 7. Security assessment of networks / Aftab Ahmad -- 8. Network security auditing / Yin Pan, Bo Yuan and Sumita Mishra -- 9. Network manageability security / Salvador Mandujano -- 10. Security and attacks in wireless sensor networks / Murat Al and Kenji Yoshigoe -- 11. Wireless sensor networks: emerging applications and security solutions / Sumita Mishra -- 12. Privacy preserving data gathering in wireless sensor network / Md. Golam Kaosar and Xun Yi -- 13. BANBAD: a centralized anomaly detection technique for ad hoc networks / Rajeev Agrawal, Chaoli Cai, Ajay Gupta, Rajib Paul and Raed Salih -- 14. Data regulation protocol for source-end mitigation of distributed denial of service / Nirav Shah and Dijiang Huang -- 15. Instant messaging security / Zhijun Liu, Guoqiang Shu and David Lee |
ctrlnum | (OCoLC)1031439742 (DE-599)BVBBV044243757 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044243757</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220303</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170327s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781609607784</subfield><subfield code="9">978-1-60960-778-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781609607791</subfield><subfield code="c">print & perpetual access</subfield><subfield code="9">978-1-60960-779-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-60960-777-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1031439742</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044243757</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security, administration, and management</subfield><subfield code="b">advancing technology and practice</subfield><subfield code="c">Dulal Chandra Kar (Texas A&M University-Corpus Christi, USA), Mahbubur Rahman Syed (Minnesota State University, Mankato, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 361 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Basic device and protocol security / Bruce Hartpence -- 2. Mitigating the blended threat: protecting data and educating users / Christophe Veltsos -- 3. Security issues for multi-domain resource reservation / Christos Bouras and Kostas Stamos -- 4. Healthcare employees and passwords: an entry point for social engineering attacks / B. Dawn Medlin, Douglas May and Ken Corley -- 5. Public key infrastructure / Reed H. Petty, Jiang Bian and Remzi Seker -- 6. Key management / Chuan-Kun Wu -- 7. Security assessment of networks / Aftab Ahmad -- 8. Network security auditing / Yin Pan, Bo Yuan and Sumita Mishra -- 9. Network manageability security / Salvador Mandujano -- 10. Security and attacks in wireless sensor networks / Murat Al and Kenji Yoshigoe -- 11. Wireless sensor networks: emerging applications and security solutions / Sumita Mishra -- 12. Privacy preserving data gathering in wireless sensor network / Md. Golam Kaosar and Xun Yi -- 13. BANBAD: a centralized anomaly detection technique for ad hoc networks / Rajeev Agrawal, Chaoli Cai, Ajay Gupta, Rajib Paul and Raed Salih -- 14. Data regulation protocol for source-end mitigation of distributed denial of service / Nirav Shah and Dijiang Huang -- 15. Instant messaging security / Zhijun Liu, Guoqiang Shu and David Lee</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datennetz</subfield><subfield code="0">(DE-588)4011130-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datennetz</subfield><subfield code="0">(DE-588)4011130-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kar, Dulal Chandra</subfield><subfield code="0">(DE-588)1128625741</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Syed, Mahbubur Rahman</subfield><subfield code="d">1952-</subfield><subfield code="0">(DE-588)140908358</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-60960-777-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-60960-777-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-777-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029649043</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-777-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-777-7</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-777-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-777-7</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-777-7</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044243757 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:30Z |
institution | BVB |
isbn | 9781609607784 9781609607791 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029649043 |
oclc_num | 1031439742 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xxi, 361 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Network security, administration, and management advancing technology and practice Dulal Chandra Kar (Texas A&M University-Corpus Christi, USA), Mahbubur Rahman Syed (Minnesota State University, Mankato, USA) Hershey PA Information Science Reference [2011] © 2011 1 Online-Ressource (xxi, 361 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. Basic device and protocol security / Bruce Hartpence -- 2. Mitigating the blended threat: protecting data and educating users / Christophe Veltsos -- 3. Security issues for multi-domain resource reservation / Christos Bouras and Kostas Stamos -- 4. Healthcare employees and passwords: an entry point for social engineering attacks / B. Dawn Medlin, Douglas May and Ken Corley -- 5. Public key infrastructure / Reed H. Petty, Jiang Bian and Remzi Seker -- 6. Key management / Chuan-Kun Wu -- 7. Security assessment of networks / Aftab Ahmad -- 8. Network security auditing / Yin Pan, Bo Yuan and Sumita Mishra -- 9. Network manageability security / Salvador Mandujano -- 10. Security and attacks in wireless sensor networks / Murat Al and Kenji Yoshigoe -- 11. Wireless sensor networks: emerging applications and security solutions / Sumita Mishra -- 12. Privacy preserving data gathering in wireless sensor network / Md. Golam Kaosar and Xun Yi -- 13. BANBAD: a centralized anomaly detection technique for ad hoc networks / Rajeev Agrawal, Chaoli Cai, Ajay Gupta, Rajib Paul and Raed Salih -- 14. Data regulation protocol for source-end mitigation of distributed denial of service / Nirav Shah and Dijiang Huang -- 15. Instant messaging security / Zhijun Liu, Guoqiang Shu and David Lee "This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems"-- Computer networks / Management Computer networks / Security measures Technologie (DE-588)4059276-5 gnd rswk-swf Datennetz (DE-588)4011130-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Datennetz (DE-588)4011130-1 s Computersicherheit (DE-588)4274324-2 s Technologie (DE-588)4059276-5 s DE-604 Kar, Dulal Chandra (DE-588)1128625741 edt Syed, Mahbubur Rahman 1952- (DE-588)140908358 edt Erscheint auch als Druck-Ausgabe 978-1-60960-777-7 Erscheint auch als Druck-Ausgabe 1-60960-777-5 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-777-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Network security, administration, and management advancing technology and practice 1. Basic device and protocol security / Bruce Hartpence -- 2. Mitigating the blended threat: protecting data and educating users / Christophe Veltsos -- 3. Security issues for multi-domain resource reservation / Christos Bouras and Kostas Stamos -- 4. Healthcare employees and passwords: an entry point for social engineering attacks / B. Dawn Medlin, Douglas May and Ken Corley -- 5. Public key infrastructure / Reed H. Petty, Jiang Bian and Remzi Seker -- 6. Key management / Chuan-Kun Wu -- 7. Security assessment of networks / Aftab Ahmad -- 8. Network security auditing / Yin Pan, Bo Yuan and Sumita Mishra -- 9. Network manageability security / Salvador Mandujano -- 10. Security and attacks in wireless sensor networks / Murat Al and Kenji Yoshigoe -- 11. Wireless sensor networks: emerging applications and security solutions / Sumita Mishra -- 12. Privacy preserving data gathering in wireless sensor network / Md. Golam Kaosar and Xun Yi -- 13. BANBAD: a centralized anomaly detection technique for ad hoc networks / Rajeev Agrawal, Chaoli Cai, Ajay Gupta, Rajib Paul and Raed Salih -- 14. Data regulation protocol for source-end mitigation of distributed denial of service / Nirav Shah and Dijiang Huang -- 15. Instant messaging security / Zhijun Liu, Guoqiang Shu and David Lee Computer networks / Management Computer networks / Security measures Technologie (DE-588)4059276-5 gnd Datennetz (DE-588)4011130-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4059276-5 (DE-588)4011130-1 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Network security, administration, and management advancing technology and practice |
title_auth | Network security, administration, and management advancing technology and practice |
title_exact_search | Network security, administration, and management advancing technology and practice |
title_full | Network security, administration, and management advancing technology and practice Dulal Chandra Kar (Texas A&M University-Corpus Christi, USA), Mahbubur Rahman Syed (Minnesota State University, Mankato, USA) |
title_fullStr | Network security, administration, and management advancing technology and practice Dulal Chandra Kar (Texas A&M University-Corpus Christi, USA), Mahbubur Rahman Syed (Minnesota State University, Mankato, USA) |
title_full_unstemmed | Network security, administration, and management advancing technology and practice Dulal Chandra Kar (Texas A&M University-Corpus Christi, USA), Mahbubur Rahman Syed (Minnesota State University, Mankato, USA) |
title_short | Network security, administration, and management |
title_sort | network security administration and management advancing technology and practice |
title_sub | advancing technology and practice |
topic | Computer networks / Management Computer networks / Security measures Technologie (DE-588)4059276-5 gnd Datennetz (DE-588)4011130-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks / Management Computer networks / Security measures Technologie Datennetz Computersicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-777-7 |
work_keys_str_mv | AT kardulalchandra networksecurityadministrationandmanagementadvancingtechnologyandpractice AT syedmahbuburrahman networksecurityadministrationandmanagementadvancingtechnologyandpractice |