Security in distributed, grid, mobile, and pervasive computing:
Focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. Presenting strategies for security issues, this book reviews security issues and challenges in content distribution networks, and also describes key agreement protocol...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Schlagworte: | |
Online-Zugang: | kostenfrei |
Zusammenfassung: | Focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. Presenting strategies for security issues, this book reviews security issues and challenges in content distribution networks, and also describes key agreement protocols based on the Diffie-Hellman key exchange |
Beschreibung: | 1 Online-Ressource (420 Seiten) illustrations |
ISBN: | 0849379253 1466526440 9780849379253 9781466526440 |
Zugangseinschränkungen: | Open Access |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048279775 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220610s2007 |||| o||u| ||||||eng d | ||
020 | |a 0849379253 |q (electronic bk.) |9 0849379253 | ||
020 | |a 1466526440 |9 1466526440 | ||
020 | |a 9780849379253 |q (electronic bk.) |9 9780849379253 | ||
020 | |a 9781466526440 |9 9781466526440 | ||
020 | |z 0849379210 |q (alk. paper) |9 0849379210 | ||
020 | |z 9780849379215 |q (alk. paper) |9 9780849379215 | ||
024 | 7 | |a 10.1201/9780849379253 |2 doi | |
035 | |a (OCoLC)173376759 | ||
035 | |a (DE-599)BVBBV048279775 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
100 | 1 | |a Xiao, Yang |d 1966- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security in distributed, grid, mobile, and pervasive computing |c Yang Xiao |
264 | 0 | |a Boca Raton |b Auerbach Publications |c ©2007 | |
300 | |a 1 Online-Ressource (420 Seiten) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks -- Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks | |
506 | 0 | |a Open Access |5 EbpS | |
520 | 3 | |a Focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. Presenting strategies for security issues, this book reviews security issues and challenges in content distribution networks, and also describes key agreement protocols based on the Diffie-Hellman key exchange | |
650 | 4 | |a Computer Security | |
650 | 7 | |a Internet mobile |2 Sécurité | |
650 | 7 | |a Réseaux d'ordinateurs |2 Sécurité | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 7 | |a COMPUTERS |2 Internet | |
650 | 7 | |a COMPUTERS |2 Networking | |
650 | 7 | |a COMPUTERS |2 Security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
653 | 6 | |a Electronic books | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Xiao, Yang |t Security in distributed, grid, mobile, and pervasive computing |d Boca Raton : Auerbach Publications, ©2007 |z 9780849379215 |z 0849379210 |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201841 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-4-EOAC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033659941 | ||
347 | |a data file |
Datensatz im Suchindex
_version_ | 1804184104237793280 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Xiao, Yang 1966- |
author_facet | Xiao, Yang 1966- |
author_role | aut |
author_sort | Xiao, Yang 1966- |
author_variant | y x yx |
building | Verbundindex |
bvnumber | BV048279775 |
collection | ZDB-4-EOAC |
contents | Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks -- Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks |
ctrlnum | (OCoLC)173376759 (DE-599)BVBBV048279775 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02844nmm a2200541 c 4500</leader><controlfield tag="001">BV048279775</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220610s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0849379253</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">0849379253</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466526440</subfield><subfield code="9">1466526440</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780849379253</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">9780849379253</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466526440</subfield><subfield code="9">9781466526440</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0849379210</subfield><subfield code="q">(alk. paper)</subfield><subfield code="9">0849379210</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780849379215</subfield><subfield code="q">(alk. paper)</subfield><subfield code="9">9780849379215</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9780849379253</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)173376759</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048279775</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Xiao, Yang</subfield><subfield code="d">1966-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in distributed, grid, mobile, and pervasive computing</subfield><subfield code="c">Yang Xiao</subfield></datafield><datafield tag="264" ind1=" " ind2="0"><subfield code="a">Boca Raton</subfield><subfield code="b">Auerbach Publications</subfield><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (420 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks -- Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield><subfield code="5">EbpS</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. Presenting strategies for security issues, this book reviews security issues and challenges in content distribution networks, and also describes key agreement protocols based on the Diffie-Hellman key exchange</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet mobile</subfield><subfield code="2">Sécurité</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="2">Sécurité</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Xiao, Yang</subfield><subfield code="t">Security in distributed, grid, mobile, and pervasive computing</subfield><subfield code="d">Boca Raton : Auerbach Publications, ©2007</subfield><subfield code="z">9780849379215</subfield><subfield code="z">0849379210</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201841</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EOAC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033659941</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield></record></collection> |
id | DE-604.BV048279775 |
illustrated | Illustrated |
index_date | 2024-07-03T20:00:52Z |
indexdate | 2024-07-10T09:34:02Z |
institution | BVB |
isbn | 0849379253 1466526440 9780849379253 9781466526440 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033659941 |
oclc_num | 173376759 |
open_access_boolean | 1 |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (420 Seiten) illustrations |
psigel | ZDB-4-EOAC |
publishDateSearch | 2007 |
publishDateSort | 2007 |
record_format | marc |
spelling | Xiao, Yang 1966- Verfasser aut Security in distributed, grid, mobile, and pervasive computing Yang Xiao Boca Raton Auerbach Publications ©2007 1 Online-Ressource (420 Seiten) illustrations txt rdacontent c rdamedia cr rdacarrier Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks -- Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks Open Access EbpS Focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. Presenting strategies for security issues, this book reviews security issues and challenges in content distribution networks, and also describes key agreement protocols based on the Diffie-Hellman key exchange Computer Security Internet mobile Sécurité Réseaux d'ordinateurs Sécurité Sécurité informatique Computer security COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Computer networks Security measures Electronic books Erscheint auch als Druck-Ausgabe Xiao, Yang Security in distributed, grid, mobile, and pervasive computing Boca Raton : Auerbach Publications, ©2007 9780849379215 0849379210 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201841 Verlag kostenfrei Volltext data file |
spellingShingle | Xiao, Yang 1966- Security in distributed, grid, mobile, and pervasive computing Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks -- Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks Computer Security Internet mobile Sécurité Réseaux d'ordinateurs Sécurité Sécurité informatique Computer security COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Computer networks Security measures |
title | Security in distributed, grid, mobile, and pervasive computing |
title_auth | Security in distributed, grid, mobile, and pervasive computing |
title_exact_search | Security in distributed, grid, mobile, and pervasive computing |
title_exact_search_txtP | Security in distributed, grid, mobile, and pervasive computing |
title_full | Security in distributed, grid, mobile, and pervasive computing Yang Xiao |
title_fullStr | Security in distributed, grid, mobile, and pervasive computing Yang Xiao |
title_full_unstemmed | Security in distributed, grid, mobile, and pervasive computing Yang Xiao |
title_short | Security in distributed, grid, mobile, and pervasive computing |
title_sort | security in distributed grid mobile and pervasive computing |
topic | Computer Security Internet mobile Sécurité Réseaux d'ordinateurs Sécurité Sécurité informatique Computer security COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Computer networks Security measures |
topic_facet | Computer Security Internet mobile Réseaux d'ordinateurs Sécurité informatique Computer security COMPUTERS Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201841 |
work_keys_str_mv | AT xiaoyang securityindistributedgridmobileandpervasivecomputing |