Countering cyber attacks and preserving the integrity and availability of critical systems:
"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext |
Zusammenfassung: | "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522582427 |
DOI: | 10.4018/978-1-5225-8241-0 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV045441762 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 190205s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781522582427 |9 978-1-5225-8242-7 | ||
035 | |a (OCoLC)1085381752 | ||
035 | |a (DE-599)BVBBV045441762 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
245 | 1 | 0 | |a Countering cyber attacks and preserving the integrity and availability of critical systems |c S. Geetha, Asnath Victy Phamila |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer crimes / Prevention | |
650 | 4 | |a Computer security | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Geetha, S. |d 1979- |0 (DE-588)1132255171 |4 edt | |
700 | 1 | |a Phamila, Asnath Victy |d 1978- |0 (DE-588)1129269787 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-8241-0 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-8241-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079018499735552 |
---|---|
adam_text | |
any_adam_object | |
author2 | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
author2_role | edt edt |
author2_variant | s g sg a v p av avp |
author_GND | (DE-588)1132255171 (DE-588)1129269787 |
author_facet | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
building | Verbundindex |
bvnumber | BV045441762 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1085381752 (DE-599)BVBBV045441762 |
doi_str_mv | 10.4018/978-1-5225-8241-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV045441762</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190205s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522582427</subfield><subfield code="9">978-1-5225-8242-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085381752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045441762</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Countering cyber attacks and preserving the integrity and availability of critical systems</subfield><subfield code="c">S. Geetha, Asnath Victy Phamila</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geetha, S.</subfield><subfield code="d">1979-</subfield><subfield code="0">(DE-588)1132255171</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phamila, Asnath Victy</subfield><subfield code="d">1978-</subfield><subfield code="0">(DE-588)1129269787</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-8241-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045441762 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:18Z |
institution | BVB |
isbn | 9781522582427 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030827250 |
oclc_num | 1085381752 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha, Asnath Victy Phamila Hershey, PA IGI Global [2019] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- Computer networks / Security measures Computer crimes / Prevention Computer security Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast Geetha, S. 1979- (DE-588)1132255171 edt Phamila, Asnath Victy 1978- (DE-588)1129269787 edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-8241-0 https://doi.org/10.4018/978-1-5225-8241-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Countering cyber attacks and preserving the integrity and availability of critical systems Computer networks / Security measures Computer crimes / Prevention Computer security Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast |
title | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_auth | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_exact_search | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_full | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha, Asnath Victy Phamila |
title_fullStr | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha, Asnath Victy Phamila |
title_full_unstemmed | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha, Asnath Victy Phamila |
title_short | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_sort | countering cyber attacks and preserving the integrity and availability of critical systems |
topic | Computer networks / Security measures Computer crimes / Prevention Computer security Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast |
topic_facet | Computer networks / Security measures Computer crimes / Prevention Computer security |
url | https://doi.org/10.4018/978-1-5225-8241-0 |
work_keys_str_mv | AT geethas counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems AT phamilaasnathvicty counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems |