The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptogr...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
2004
|
Schriftenreihe: | The International Series in Engineering and Computer Science
767 |
Schlagworte: | |
Online-Zugang: | FHI01 BTU01 URL des Erstveröffentlichers |
Zusammenfassung: | The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing. Although it is difficult for an IT professional or an IT student to keep aware of the current terminology being practiced today, the Dictionary of Information Security presents cutting-edge information on the most recent terms in use in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology and other disciplines, this IT Security Dictionary is a reference tool that should become part of any professional and IT student's library. The Dictionary of Information Security is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering and information sciences |
Beschreibung: | 1 Online-Ressource (XXXII, 411 p. 1 illus) |
ISBN: | 9781402079276 |
DOI: | 10.1007/b115731 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045148660 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180827s2004 |||| o||u| ||||||eng d | ||
020 | |a 9781402079276 |9 978-1-4020-7927-6 | ||
024 | 7 | |a 10.1007/b115731 |2 doi | |
035 | |a (ZDB-2-ENG)978-1-4020-7927-6 | ||
035 | |a (OCoLC)1050922205 | ||
035 | |a (DE-599)BVBBV045148660 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-634 | ||
082 | 0 | |a 005.74 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Gattiker, Urs E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Information Security Dictionary |b Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology |c by Urs E. Gattiker |
264 | 1 | |a Boston, MA |b Springer US |c 2004 | |
300 | |a 1 Online-Ressource (XXXII, 411 p. 1 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a The International Series in Engineering and Computer Science |v 767 | |
520 | |a The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing. Although it is difficult for an IT professional or an IT student to keep aware of the current terminology being practiced today, the Dictionary of Information Security presents cutting-edge information on the most recent terms in use in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology and other disciplines, this IT Security Dictionary is a reference tool that should become part of any professional and IT student's library. The Dictionary of Information Security is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering and information sciences | ||
650 | 4 | |a Computer Science | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a The Computing Profession | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Management information systems | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4066724-8 |a Wörterbuch |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402078897 |
856 | 4 | 0 | |u https://doi.org/10.1007/b115731 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030538359 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/b115731 |l FHI01 |p ZDB-2-ENG |q ZDB-2-ENG_2000/2004 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/b115731 |l BTU01 |p ZDB-2-ENG |q ZDB-2-ENG_Archiv |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178819012100096 |
---|---|
any_adam_object | |
author | Gattiker, Urs E. |
author_facet | Gattiker, Urs E. |
author_role | aut |
author_sort | Gattiker, Urs E. |
author_variant | u e g ue ueg |
building | Verbundindex |
bvnumber | BV045148660 |
classification_rvk | ST 276 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-1-4020-7927-6 (OCoLC)1050922205 (DE-599)BVBBV045148660 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/b115731 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03646nmm a2200577zcb4500</leader><controlfield tag="001">BV045148660</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180827s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781402079276</subfield><subfield code="9">978-1-4020-7927-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b115731</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-1-4020-7927-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1050922205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045148660</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gattiker, Urs E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Information Security Dictionary</subfield><subfield code="b">Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology</subfield><subfield code="c">by Urs E. Gattiker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXXII, 411 p. 1 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The International Series in Engineering and Computer Science</subfield><subfield code="v">767</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing. Although it is difficult for an IT professional or an IT student to keep aware of the current terminology being practiced today, the Dictionary of Information Security presents cutting-edge information on the most recent terms in use in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology and other disciplines, this IT Security Dictionary is a reference tool that should become part of any professional and IT student's library. The Dictionary of Information Security is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering and information sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">The Computing Profession</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4066724-8</subfield><subfield code="a">Wörterbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402078897</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b115731</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030538359</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b115731</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b115731</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_Archiv</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4066724-8 Wörterbuch gnd-content |
genre_facet | Wörterbuch |
id | DE-604.BV045148660 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:10:01Z |
institution | BVB |
isbn | 9781402079276 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030538359 |
oclc_num | 1050922205 |
open_access_boolean | |
owner | DE-573 DE-634 |
owner_facet | DE-573 DE-634 |
physical | 1 Online-Ressource (XXXII, 411 p. 1 illus) |
psigel | ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_Archiv |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer US |
record_format | marc |
series2 | The International Series in Engineering and Computer Science |
spelling | Gattiker, Urs E. Verfasser aut The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology by Urs E. Gattiker Boston, MA Springer US 2004 1 Online-Ressource (XXXII, 411 p. 1 illus) txt rdacontent c rdamedia cr rdacarrier The International Series in Engineering and Computer Science 767 The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing. Although it is difficult for an IT professional or an IT student to keep aware of the current terminology being practiced today, the Dictionary of Information Security presents cutting-edge information on the most recent terms in use in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology and other disciplines, this IT Security Dictionary is a reference tool that should become part of any professional and IT student's library. The Dictionary of Information Security is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering and information sciences Computer Science Management of Computing and Information Systems Theory of Computation Data Structures, Cryptology and Information Theory The Computing Profession Computer science Data structures (Computer science) Computers Management information systems Computersicherheit (DE-588)4274324-2 gnd rswk-swf 1\p (DE-588)4066724-8 Wörterbuch gnd-content Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Erscheint auch als Druck-Ausgabe 9781402078897 https://doi.org/10.1007/b115731 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gattiker, Urs E. The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology Computer Science Management of Computing and Information Systems Theory of Computation Data Structures, Cryptology and Information Theory The Computing Profession Computer science Data structures (Computer science) Computers Management information systems Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4066724-8 |
title | The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology |
title_auth | The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology |
title_exact_search | The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology |
title_full | The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology by Urs E. Gattiker |
title_fullStr | The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology by Urs E. Gattiker |
title_full_unstemmed | The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology by Urs E. Gattiker |
title_short | The Information Security Dictionary |
title_sort | the information security dictionary defining the terms that define security for e business internet information and wireless technology |
title_sub | Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology |
topic | Computer Science Management of Computing and Information Systems Theory of Computation Data Structures, Cryptology and Information Theory The Computing Profession Computer science Data structures (Computer science) Computers Management information systems Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer Science Management of Computing and Information Systems Theory of Computation Data Structures, Cryptology and Information Theory The Computing Profession Computer science Data structures (Computer science) Computers Management information systems Computersicherheit Wörterbuch |
url | https://doi.org/10.1007/b115731 |
work_keys_str_mv | AT gattikerurse theinformationsecuritydictionarydefiningthetermsthatdefinesecurityforebusinessinternetinformationandwirelesstechnology |