Securing information and communications systems: principles, technologies, and applications
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston
Artech House
2008
|
Schriftenreihe: | Artech House information security and privacy series
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xiv, 362 pages) illustrations |
ISBN: | 9781596932296 1596932295 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045343228 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181206s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781596932296 |9 978-1-59693-229-6 | ||
020 | |a 1596932295 |9 1-59693-229-5 | ||
035 | |a (ZDB-4-ENC)ocn434586632 | ||
035 | |a (OCoLC)434586632 | ||
035 | |a (DE-599)BVBBV045343228 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Securing information and communications systems |b principles, technologies, and applications |c Steven M. Furnell [and others], editors |
264 | 1 | |a Boston |b Artech House |c 2008 | |
300 | |a 1 online resource (xiv, 362 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House information security and privacy series | |
500 | |a Print version record | ||
505 | 8 | |a This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems | |
650 | 4 | |a Securite informatique | |
650 | 4 | |a Reseaux d'ordinateurs / Securite / Mesures | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Systemes informatiques / Securite / Mesures | |
650 | 4 | |a Infrastructure a cle publique (Securite informatique) | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 4 | |a Computer security |a Computer networks |x Security measures |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Furnell, Steven |d 1970- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Securing information and communications systems |d Boston : Artech House, 2008 |z 1596932287 |z 9781596932289 |
912 | |a ZDB-4-ENC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030729932 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179161785303040 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045343228 |
collection | ZDB-4-ENC |
contents | This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems |
ctrlnum | (ZDB-4-ENC)ocn434586632 (OCoLC)434586632 (DE-599)BVBBV045343228 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02842nmm a2200553zc 4500</leader><controlfield tag="001">BV045343228</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181206s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932296</subfield><subfield code="9">978-1-59693-229-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932295</subfield><subfield code="9">1-59693-229-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ENC)ocn434586632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)434586632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045343228</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing information and communications systems</subfield><subfield code="b">principles, technologies, and applications</subfield><subfield code="c">Steven M. Furnell [and others], editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 362 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Securite informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reseaux d'ordinateurs / Securite / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systemes informatiques / Securite / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure a cle publique (Securite informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="d">1970-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Securing information and communications systems</subfield><subfield code="d">Boston : Artech House, 2008</subfield><subfield code="z">1596932287</subfield><subfield code="z">9781596932289</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ENC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030729932</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045343228 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:28Z |
institution | BVB |
isbn | 9781596932296 1596932295 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030729932 |
oclc_num | 434586632 |
open_access_boolean | |
physical | 1 online resource (xiv, 362 pages) illustrations |
psigel | ZDB-4-ENC |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Artech House |
record_format | marc |
series2 | Artech House information security and privacy series |
spelling | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors Boston Artech House 2008 1 online resource (xiv, 362 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Artech House information security and privacy series Print version record This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems Securite informatique Reseaux d'ordinateurs / Securite / Mesures Chiffrement (Informatique) Systemes informatiques / Securite / Mesures Infrastructure a cle publique (Securite informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data encryption (Computer science) fast Computer security Computer networks Security measures Data encryption (Computer science) Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Furnell, Steven 1970- Sonstige oth Erscheint auch als Druck-Ausgabe Securing information and communications systems Boston : Artech House, 2008 1596932287 9781596932289 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Securing information and communications systems principles, technologies, and applications This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems Securite informatique Reseaux d'ordinateurs / Securite / Mesures Chiffrement (Informatique) Systemes informatiques / Securite / Mesures Infrastructure a cle publique (Securite informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data encryption (Computer science) fast Computer security Computer networks Security measures Data encryption (Computer science) Betriebliches Informationssystem (DE-588)4069386-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4069386-7 (DE-588)4274324-2 |
title | Securing information and communications systems principles, technologies, and applications |
title_auth | Securing information and communications systems principles, technologies, and applications |
title_exact_search | Securing information and communications systems principles, technologies, and applications |
title_full | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors |
title_fullStr | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors |
title_full_unstemmed | Securing information and communications systems principles, technologies, and applications Steven M. Furnell [and others], editors |
title_short | Securing information and communications systems |
title_sort | securing information and communications systems principles technologies and applications |
title_sub | principles, technologies, and applications |
topic | Securite informatique Reseaux d'ordinateurs / Securite / Mesures Chiffrement (Informatique) Systemes informatiques / Securite / Mesures Infrastructure a cle publique (Securite informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data encryption (Computer science) fast Computer security Computer networks Security measures Data encryption (Computer science) Betriebliches Informationssystem (DE-588)4069386-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Securite informatique Reseaux d'ordinateurs / Securite / Mesures Chiffrement (Informatique) Systemes informatiques / Securite / Mesures Infrastructure a cle publique (Securite informatique) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Data encryption (Computer science) Computer security Computer networks Security measures Data encryption (Computer science) Betriebliches Informationssystem Computersicherheit |
work_keys_str_mv | AT furnellsteven securinginformationandcommunicationssystemsprinciplestechnologiesandapplications |