Information security science: measuring the vulnerability to data compromises
Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress is an imprint of Elsevier
2016
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes connections between information security, physical security, information technology, and information theory |
Beschreibung: | Includes index Includes bibliographical references and index |
Beschreibung: | 1 online resource |
ISBN: | 9780128096468 0128096462 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045381919 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181228s2016 |||| o||u| ||||||eng d | ||
020 | |a 9780128096468 |9 978-0-12-809646-8 | ||
020 | |a 0128096462 |9 0-12-809646-2 | ||
035 | |a (ZDB-33-ESD)ocn953413023 | ||
035 | |a (ZDB-33-EBS)ocn953413023 | ||
035 | |a (OCoLC)953413023 | ||
035 | |a (DE-599)BVBBV045381919 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Young, Carl S. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security science |b measuring the vulnerability to data compromises |c Carl S. Young |
264 | 1 | |a Cambridge, MA |b Syngress is an imprint of Elsevier |c 2016 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes connections between information security, physical security, information technology, and information theory | ||
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128096437 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0128096438 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128096437 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030768251 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780128096437 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804179233218494464 |
---|---|
any_adam_object | |
author | Young, Carl S. |
author_facet | Young, Carl S. |
author_role | aut |
author_sort | Young, Carl S. |
author_variant | c s y cs csy |
building | Verbundindex |
bvnumber | BV045381919 |
classification_rvk | ST 277 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn953413023 (ZDB-33-EBS)ocn953413023 (OCoLC)953413023 (DE-599)BVBBV045381919 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02076nmm a2200445zc 4500</leader><controlfield tag="001">BV045381919</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181228s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128096468</subfield><subfield code="9">978-0-12-809646-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128096462</subfield><subfield code="9">0-12-809646-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn953413023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn953413023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953413023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045381919</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Young, Carl S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security science</subfield><subfield code="b">measuring the vulnerability to data compromises</subfield><subfield code="c">Carl S. Young</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress is an imprint of Elsevier</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes connections between information security, physical security, information technology, and information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128096437</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0128096438</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128096437</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030768251</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128096437</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045381919 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:16:36Z |
institution | BVB |
isbn | 9780128096468 0128096462 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030768251 |
oclc_num | 953413023 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Syngress is an imprint of Elsevier |
record_format | marc |
spelling | Young, Carl S. Verfasser aut Information security science measuring the vulnerability to data compromises Carl S. Young Cambridge, MA Syngress is an imprint of Elsevier 2016 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes connections between information security, physical security, information technology, and information theory Computer security fast Information technology / Security measures fast Computer security Information technology Security measures Erscheint auch als Druck-Ausgabe 9780128096437 Erscheint auch als Druck-Ausgabe 0128096438 http://www.sciencedirect.com/science/book/9780128096437 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Young, Carl S. Information security science measuring the vulnerability to data compromises Computer security fast Information technology / Security measures fast Computer security Information technology Security measures |
title | Information security science measuring the vulnerability to data compromises |
title_auth | Information security science measuring the vulnerability to data compromises |
title_exact_search | Information security science measuring the vulnerability to data compromises |
title_full | Information security science measuring the vulnerability to data compromises Carl S. Young |
title_fullStr | Information security science measuring the vulnerability to data compromises Carl S. Young |
title_full_unstemmed | Information security science measuring the vulnerability to data compromises Carl S. Young |
title_short | Information security science |
title_sort | information security science measuring the vulnerability to data compromises |
title_sub | measuring the vulnerability to data compromises |
topic | Computer security fast Information technology / Security measures fast Computer security Information technology Security measures |
topic_facet | Computer security Information technology / Security measures Information technology Security measures |
url | http://www.sciencedirect.com/science/book/9780128096437 |
work_keys_str_mv | AT youngcarls informationsecuritysciencemeasuringthevulnerabilitytodatacompromises |