Communication system security:
"Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protoco...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2012]
|
Schriftenreihe: | Chapman & Hall/CRC cryptography and network security
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltstext |
Zusammenfassung: | "Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience"-- "Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience"-- |
Beschreibung: | xix, 730 Seiten Illustrationen, Diagramme |
ISBN: | 9781439840368 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049941475 | ||
003 | DE-604 | ||
005 | 20241125 | ||
007 | t| | ||
008 | 241107s2012 xxua||| |||| 00||| eng d | ||
020 | |a 9781439840368 |9 978-1-4398-4036-8 | ||
035 | |a (OCoLC)1106723774 | ||
035 | |a (DE-599)GBV670981850 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US |a xxk |c XA-GB | ||
049 | |a DE-703 | ||
082 | 0 | |a 621.389/28 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 94A62 |2 msc | ||
084 | |a 68-01 |2 msc | ||
084 | |a 68M12 |2 msc | ||
084 | |a 53.73 |2 bkl | ||
084 | |a *94-01 |2 msc | ||
084 | |a 94A60 |2 msc | ||
084 | |a 68M10 |2 msc | ||
100 | 1 | |a Chen, Lidong |e Verfasser |4 aut | |
245 | 1 | 0 | |a Communication system security |c Lidong Chen (National Institute of Standards and Technology Gaithersburg, Maryland, USA), Guang Gong (University of Waterloo Ontario, Canada) |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2012] | |
300 | |a xix, 730 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Chapman & Hall/CRC cryptography and network security | |
520 | 3 | |a "Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience"-- | |
520 | 3 | |a "Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience"-- | |
583 | 1 | |a Archivierung prüfen |c 20240324 |f DE-4165 |z 1 |2 pdager | |
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |c 20240722 |f NI-LastCopies |x XA-DE-NI |z Potenzieller Alleinbesitz Niedersachsen |2 pdager |5 DE-89 | |
650 | 0 | 7 | |a Kommunikationssystem |0 (DE-588)4125542-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Telecommunication / Security measures | |
689 | 0 | 0 | |a Kommunikationssystem |0 (DE-588)4125542-2 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gong, Guang |e Verfasser |4 aut | |
856 | 4 | 2 | |m B:DE-89 |m V:DE-601 |q pdf/application |u http://www.gbv.de/dms/tib-ub-hannover/670981850.pdf |v 2013-07-26 |x Verlag |y Inhaltsverzeichnis |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m B:ZBM |u https://zbmath.org/?q=an:1263.94001 |v 2021-04-12 |x Verlag |y Zentralblatt MATH |3 Inhaltstext |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035279697 |
Datensatz im Suchindex
_version_ | 1822483065161646080 |
---|---|
adam_text | |
any_adam_object | |
author | Chen, Lidong Gong, Guang |
author_facet | Chen, Lidong Gong, Guang |
author_role | aut aut |
author_sort | Chen, Lidong |
author_variant | l c lc g g gg |
building | Verbundindex |
bvnumber | BV049941475 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1106723774 (DE-599)GBV670981850 |
dewey-full | 621.389/28 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.389/28 |
dewey-search | 621.389/28 |
dewey-sort | 3621.389 228 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049941475</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241125</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241107s2012 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439840368</subfield><subfield code="9">978-1-4398-4036-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1106723774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV670981850</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.389/28</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A62</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68-01</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68M12</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.73</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">*94-01</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68M10</subfield><subfield code="2">msc</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chen, Lidong</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Communication system security</subfield><subfield code="c">Lidong Chen (National Institute of Standards and Technology Gaithersburg, Maryland, USA), Guang Gong (University of Waterloo Ontario, Canada)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xix, 730 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Chapman & Hall/CRC cryptography and network security</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience"--</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience"--</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung prüfen</subfield><subfield code="c">20240324</subfield><subfield code="f">DE-4165</subfield><subfield code="z">1</subfield><subfield code="2">pdager</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung/Langzeitarchivierung gewährleistet</subfield><subfield code="c">20240722</subfield><subfield code="f">NI-LastCopies</subfield><subfield code="x">XA-DE-NI</subfield><subfield code="z">Potenzieller Alleinbesitz Niedersachsen</subfield><subfield code="2">pdager</subfield><subfield code="5">DE-89</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationssystem</subfield><subfield code="0">(DE-588)4125542-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Telecommunication / Security measures</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kommunikationssystem</subfield><subfield code="0">(DE-588)4125542-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gong, Guang</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">B:DE-89</subfield><subfield code="m">V:DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/tib-ub-hannover/670981850.pdf</subfield><subfield code="v">2013-07-26</subfield><subfield code="x">Verlag</subfield><subfield code="y">Inhaltsverzeichnis</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">B:ZBM</subfield><subfield code="u">https://zbmath.org/?q=an:1263.94001</subfield><subfield code="v">2021-04-12</subfield><subfield code="x">Verlag</subfield><subfield code="y">Zentralblatt MATH</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035279697</subfield></datafield></record></collection> |
id | DE-604.BV049941475 |
illustrated | Illustrated |
indexdate | 2025-01-28T09:08:11Z |
institution | BVB |
isbn | 9781439840368 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035279697 |
oclc_num | 1106723774 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | xix, 730 Seiten Illustrationen, Diagramme |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | CRC Press |
record_format | marc |
series2 | Chapman & Hall/CRC cryptography and network security |
spelling | Chen, Lidong Verfasser aut Communication system security Lidong Chen (National Institute of Standards and Technology Gaithersburg, Maryland, USA), Guang Gong (University of Waterloo Ontario, Canada) Boca Raton ; London ; New York CRC Press [2012] xix, 730 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Chapman & Hall/CRC cryptography and network security "Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing trusted communications and common methods and mechanisms used in protecting transmitted and processed information. The authors present the principles and protocols in an accessible, easy-to-understand format. The main topics featured are cryptography, IKE, IPsec, and TLS. The book includes many examples to illustrate the concepts presented and exercises provided in each chapter offer hands-on experience"-- Archivierung prüfen 20240324 DE-4165 1 pdager Archivierung/Langzeitarchivierung gewährleistet 20240722 NI-LastCopies XA-DE-NI Potenzieller Alleinbesitz Niedersachsen pdager DE-89 Kommunikationssystem (DE-588)4125542-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Telecommunication / Security measures Kommunikationssystem (DE-588)4125542-2 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Gong, Guang Verfasser aut B:DE-89 V:DE-601 pdf/application http://www.gbv.de/dms/tib-ub-hannover/670981850.pdf 2013-07-26 Verlag Inhaltsverzeichnis Inhaltsverzeichnis B:ZBM https://zbmath.org/?q=an:1263.94001 2021-04-12 Verlag Zentralblatt MATH Inhaltstext |
spellingShingle | Chen, Lidong Gong, Guang Communication system security Kommunikationssystem (DE-588)4125542-2 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4125542-2 (DE-588)4070085-9 (DE-588)4274324-2 |
title | Communication system security |
title_auth | Communication system security |
title_exact_search | Communication system security |
title_full | Communication system security Lidong Chen (National Institute of Standards and Technology Gaithersburg, Maryland, USA), Guang Gong (University of Waterloo Ontario, Canada) |
title_fullStr | Communication system security Lidong Chen (National Institute of Standards and Technology Gaithersburg, Maryland, USA), Guang Gong (University of Waterloo Ontario, Canada) |
title_full_unstemmed | Communication system security Lidong Chen (National Institute of Standards and Technology Gaithersburg, Maryland, USA), Guang Gong (University of Waterloo Ontario, Canada) |
title_short | Communication system security |
title_sort | communication system security |
topic | Kommunikationssystem (DE-588)4125542-2 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kommunikationssystem Rechnernetz Computersicherheit |
url | http://www.gbv.de/dms/tib-ub-hannover/670981850.pdf https://zbmath.org/?q=an:1263.94001 |
work_keys_str_mv | AT chenlidong communicationsystemsecurity AT gongguang communicationsystemsecurity |