Principles of Secure Network Systems Design:
As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as org...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
2002
|
Ausgabe: | 1st ed. 2002 |
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution |
Beschreibung: | 1 Online-Ressource (XXVI, 209 p) |
ISBN: | 9781461300298 |
DOI: | 10.1007/978-1-4613-0029-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064699 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2002 |||| o||u| ||||||eng d | ||
020 | |a 9781461300298 |9 978-1-4613-0029-8 | ||
024 | 7 | |a 10.1007/978-1-4613-0029-8 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4613-0029-8 | ||
035 | |a (OCoLC)1227479860 | ||
035 | |a (DE-599)BVBBV047064699 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004.6 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Ghosh, Sumit |e Verfasser |4 aut | |
245 | 1 | 0 | |a Principles of Secure Network Systems Design |c by Sumit Ghosh |
250 | |a 1st ed. 2002 | ||
264 | 1 | |a New York, NY |b Springer New York |c 2002 | |
300 | |a 1 Online-Ressource (XXVI, 209 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution | ||
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Computational Mathematics and Numerical Analysis | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer mathematics | |
650 | 0 | 7 | |a Dienstgüte |0 (DE-588)4496068-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a ATM |0 (DE-588)4267988-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |D s |
689 | 0 | 1 | |a ATM |0 (DE-588)4267988-6 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 4 | |a Dienstgüte |0 (DE-588)4496068-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461265382 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387952130 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461300304 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4613-0029-8 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471811 | ||
966 | e | |u https://doi.org/10.1007/978-1-4613-0029-8 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182063074508800 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Ghosh, Sumit |
author_facet | Ghosh, Sumit |
author_role | aut |
author_sort | Ghosh, Sumit |
author_variant | s g sg |
building | Verbundindex |
bvnumber | BV047064699 |
classification_rvk | ST 200 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4613-0029-8 (OCoLC)1227479860 (DE-599)BVBBV047064699 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4613-0029-8 |
edition | 1st ed. 2002 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03828nmm a2200649zc 4500</leader><controlfield tag="001">BV047064699</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461300298</subfield><subfield code="9">978-1-4613-0029-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4613-0029-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4613-0029-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227479860</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064699</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ghosh, Sumit</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of Secure Network Systems Design</subfield><subfield code="c">by Sumit Ghosh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2002</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXVI, 209 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Mathematics and Numerical Analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer mathematics</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Dienstgüte</subfield><subfield code="0">(DE-588)4496068-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">ATM</subfield><subfield code="0">(DE-588)4267988-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">ATM</subfield><subfield code="0">(DE-588)4267988-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Dienstgüte</subfield><subfield code="0">(DE-588)4496068-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461265382</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387952130</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461300304</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4613-0029-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471811</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4613-0029-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064699 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:23Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9781461300298 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471811 |
oclc_num | 1227479860 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXVI, 209 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer New York |
record_format | marc |
spelling | Ghosh, Sumit Verfasser aut Principles of Secure Network Systems Design by Sumit Ghosh 1st ed. 2002 New York, NY Springer New York 2002 1 Online-Ressource (XXVI, 209 p) txt rdacontent c rdamedia cr rdacarrier As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution Computer Communication Networks Cryptology Theory of Computation Computational Mathematics and Numerical Analysis Computer communication systems Data encryption (Computer science) Computers Computer mathematics Dienstgüte (DE-588)4496068-2 gnd rswk-swf ATM (DE-588)4267988-6 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Telekommunikationsnetz (DE-588)4133586-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Telekommunikationsnetz (DE-588)4133586-7 s ATM (DE-588)4267988-6 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Dienstgüte (DE-588)4496068-2 s DE-604 Erscheint auch als Druck-Ausgabe 9781461265382 Erscheint auch als Druck-Ausgabe 9780387952130 Erscheint auch als Druck-Ausgabe 9781461300304 https://doi.org/10.1007/978-1-4613-0029-8 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Ghosh, Sumit Principles of Secure Network Systems Design Computer Communication Networks Cryptology Theory of Computation Computational Mathematics and Numerical Analysis Computer communication systems Data encryption (Computer science) Computers Computer mathematics Dienstgüte (DE-588)4496068-2 gnd ATM (DE-588)4267988-6 gnd Datensicherung (DE-588)4011144-1 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4496068-2 (DE-588)4267988-6 (DE-588)4011144-1 (DE-588)4133586-7 (DE-588)4274324-2 |
title | Principles of Secure Network Systems Design |
title_auth | Principles of Secure Network Systems Design |
title_exact_search | Principles of Secure Network Systems Design |
title_exact_search_txtP | Principles of Secure Network Systems Design |
title_full | Principles of Secure Network Systems Design by Sumit Ghosh |
title_fullStr | Principles of Secure Network Systems Design by Sumit Ghosh |
title_full_unstemmed | Principles of Secure Network Systems Design by Sumit Ghosh |
title_short | Principles of Secure Network Systems Design |
title_sort | principles of secure network systems design |
topic | Computer Communication Networks Cryptology Theory of Computation Computational Mathematics and Numerical Analysis Computer communication systems Data encryption (Computer science) Computers Computer mathematics Dienstgüte (DE-588)4496068-2 gnd ATM (DE-588)4267988-6 gnd Datensicherung (DE-588)4011144-1 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer Communication Networks Cryptology Theory of Computation Computational Mathematics and Numerical Analysis Computer communication systems Data encryption (Computer science) Computers Computer mathematics Dienstgüte ATM Datensicherung Telekommunikationsnetz Computersicherheit |
url | https://doi.org/10.1007/978-1-4613-0029-8 |
work_keys_str_mv | AT ghoshsumit principlesofsecurenetworksystemsdesign |