Information security policies and actions in modern integrated systems:
This title is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
c2004
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-706 DE-1050 DE-1049 DE-83 Volltext |
Zusammenfassung: | This title is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, and layered architectures. Contributions come both from the academic and the industrial field |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (electronic texts (xvii, 341 p. ill. (some col.)) digital files |
DOI: | 10.4018/978-1-59140-186-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047945260 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220419s2004 |||| o||u| ||||||eng d | ||
024 | 7 | |a 10.4018/978-1-59140-186-5 |2 doi | |
035 | |a (ZDB-1-IGE)068997051 | ||
035 | |a (OCoLC)1312701037 | ||
035 | |a (DE-599)BVBBV047945260 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Information security policies and actions in modern integrated systems |c Mariagrazia Fugini, Carlo Bellettini, [editors] |
264 | 1 | |a Hershey, Pa |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |c c2004 | |
300 | |a 1 Online-Ressource (electronic texts (xvii, 341 p. ill. (some col.)) |b digital files | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a This title is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, and layered architectures. Contributions come both from the academic and the industrial field | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Integrated circuits | |
700 | 1 | |a Fugini, Mariagrazia |d 1957- |4 ctb | |
700 | 1 | |a Bellettini, Carlo |d 1967- |4 ctb | |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-59140-186-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033326690 | |
966 | e | |u https://doi.org/10.4018/978-1-59140-186-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-186-5 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-186-5 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-186-5 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59140-186-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138582735454208 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Fugini, Mariagrazia 1957- Bellettini, Carlo 1967- |
author2_role | ctb ctb |
author2_variant | m f mf c b cb |
author_facet | Fugini, Mariagrazia 1957- Bellettini, Carlo 1967- |
building | Verbundindex |
bvnumber | BV047945260 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)068997051 (OCoLC)1312701037 (DE-599)BVBBV047945260 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-59140-186-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047945260</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220419s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59140-186-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)068997051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312701037</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047945260</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security policies and actions in modern integrated systems</subfield><subfield code="c">Mariagrazia Fugini, Carlo Bellettini, [editors]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="c">c2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (electronic texts (xvii, 341 p. ill. (some col.))</subfield><subfield code="b">digital files</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This title is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, and layered architectures. Contributions come both from the academic and the industrial field</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Integrated circuits</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fugini, Mariagrazia</subfield><subfield code="d">1957-</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bellettini, Carlo</subfield><subfield code="d">1967-</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-59140-186-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033326690</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-186-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-186-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-186-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-186-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59140-186-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047945260 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:36:12Z |
indexdate | 2024-08-23T01:08:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033326690 |
oclc_num | 1312701037 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (electronic texts (xvii, 341 p. ill. (some col.)) digital files |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |
record_format | marc |
spelling | Information security policies and actions in modern integrated systems Mariagrazia Fugini, Carlo Bellettini, [editors] Hershey, Pa IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) c2004 1 Online-Ressource (electronic texts (xvii, 341 p. ill. (some col.)) digital files txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index This title is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, and layered architectures. Contributions come both from the academic and the industrial field Computer security Integrated circuits Fugini, Mariagrazia 1957- ctb Bellettini, Carlo 1967- ctb https://doi.org/10.4018/978-1-59140-186-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Information security policies and actions in modern integrated systems Computer security Integrated circuits |
title | Information security policies and actions in modern integrated systems |
title_auth | Information security policies and actions in modern integrated systems |
title_exact_search | Information security policies and actions in modern integrated systems |
title_exact_search_txtP | Information security policies and actions in modern integrated systems |
title_full | Information security policies and actions in modern integrated systems Mariagrazia Fugini, Carlo Bellettini, [editors] |
title_fullStr | Information security policies and actions in modern integrated systems Mariagrazia Fugini, Carlo Bellettini, [editors] |
title_full_unstemmed | Information security policies and actions in modern integrated systems Mariagrazia Fugini, Carlo Bellettini, [editors] |
title_short | Information security policies and actions in modern integrated systems |
title_sort | information security policies and actions in modern integrated systems |
topic | Computer security Integrated circuits |
topic_facet | Computer security Integrated circuits |
url | https://doi.org/10.4018/978-1-59140-186-5 |
work_keys_str_mv | AT fuginimariagrazia informationsecuritypoliciesandactionsinmodernintegratedsystems AT bellettinicarlo informationsecuritypoliciesandactionsinmodernintegratedsystems |