Information assurance :: dependability and security in networked systems /
In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electro...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Elsevier/Morgan Kaufmann,
©2008.
|
Schriftenreihe: | Morgan Kaufmann series in networking.
Morgan Kaufmann series in computer security. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 DE-862 DE-863 |
Zusammenfassung: | In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks. Printbegrænsninger: Der kan printes kapitelvis. |
Beschreibung: | 1 online resource (xxxvii, 537 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080555881 0080555888 1281096172 9781281096173 9786611096175 6611096175 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn190760120 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080111s2008 ne a ob 001 0 eng d | ||
010 | |z 2007033726 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d E7B |d OCLCQ |d DKDLA |d OCLCQ |d COO |d OCLCO |d OCLCQ |d OCLCF |d OCLCQ |d OPELS |d B24X7 |d VLB |d OCLCQ |d AZK |d JBG |d COCUF |d AGLDB |d STF |d MOR |d PIFAG |d ZCU |d OTZ |d LIV |d OCLCQ |d OCLCA |d NLE |d WRM |d D6H |d VTS |d NRAMU |d VT2 |d OCLCQ |d UKMGB |d LEAUB |d AU@ |d M8D |d OCLCQ |d VLY |d BRF |d UKCRE |d OCLCQ |d OCLCO |d MHW |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d INARC |d OCLCO |d OCLCL |d EZC | ||
015 | |a GBB6H5404 |2 bnb | ||
016 | 7 | |a 017585178 |2 Uk | |
019 | |a 228148418 |a 473204748 |a 647692047 |a 961595880 |a 962700702 |a 984786104 |a 988441715 |a 991961986 |a 995040134 |a 1034977534 |a 1037793297 |a 1038674304 |a 1045455063 |a 1055378383 |a 1081286609 |a 1103267677 |a 1129355989 |a 1152985238 |a 1161999502 |a 1192342023 |a 1228545597 |a 1391569258 | ||
020 | |a 9780080555881 |q (electronic bk.) | ||
020 | |a 0080555888 |q (electronic bk.) | ||
020 | |a 1281096172 | ||
020 | |a 9781281096173 | ||
020 | |a 9786611096175 | ||
020 | |a 6611096175 | ||
020 | |z 9780123735669 |q (pbk. ; |q alk. paper) | ||
020 | |z 0123735661 |q (pbk. ; |q alk. paper) | ||
035 | |a (OCoLC)190760120 |z (OCoLC)228148418 |z (OCoLC)473204748 |z (OCoLC)647692047 |z (OCoLC)961595880 |z (OCoLC)962700702 |z (OCoLC)984786104 |z (OCoLC)988441715 |z (OCoLC)991961986 |z (OCoLC)995040134 |z (OCoLC)1034977534 |z (OCoLC)1037793297 |z (OCoLC)1038674304 |z (OCoLC)1045455063 |z (OCoLC)1055378383 |z (OCoLC)1081286609 |z (OCoLC)1103267677 |z (OCoLC)1129355989 |z (OCoLC)1152985238 |z (OCoLC)1161999502 |z (OCoLC)1192342023 |z (OCoLC)1228545597 |z (OCoLC)1391569258 | ||
037 | |a 134565:134696 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .I5247 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Information assurance : |b dependability and security in networked systems / |c [edited by] Yi Qian [and others]. |
260 | |a Amsterdam ; |a Boston : |b Elsevier/Morgan Kaufmann, |c ©2008. | ||
300 | |a 1 online resource (xxxvii, 537 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Morgan Kaufmann series in networking | |
490 | 1 | |a The Morgan Kaufmann series in computer security | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. | |
520 | 8 | |a In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks. | |
520 | 8 | |a Printbegrænsninger: Der kan printes kapitelvis. | |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer networks |x Reliability. | |
650 | 0 | |a Computer security. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Fiabilité. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Computer networks |x Reliability. |2 blmlsh | |
650 | 7 | |a Computer security. |2 blmlsh | |
650 | 7 | |a Computer networks |x Reliability |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026039 | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
700 | 1 | |a Qian, Yi, |d 1962- |0 http://id.loc.gov/authorities/names/n2007059654 | |
758 | |i has work: |a Information assurance (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGW4xFKWXvdY9RgD6rYJcK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Information assurance. |d Amsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008 |z 9780123735669 |z 0123735661 |w (DLC) 2007033726 |w (OCoLC)166290628 |
830 | 0 | |a Morgan Kaufmann series in networking. |0 http://id.loc.gov/authorities/names/no96046303 | |
830 | 0 | |a Morgan Kaufmann series in computer security. |0 http://id.loc.gov/authorities/names/no2007139011 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214765 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214765 |3 Volltext |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780123735669 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780123735669 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00037350 | ||
938 | |a ebrary |b EBRY |n ebr10204358 | ||
938 | |a EBSCOhost |b EBSC |n 214765 | ||
938 | |a YBP Library Services |b YANK |n 2754827 | ||
938 | |a Internet Archive |b INAR |n informationassur0000unse | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn190760120 |
---|---|
_version_ | 1829094617775079425 |
adam_text | |
any_adam_object | |
author2 | Qian, Yi, 1962- |
author2_role | |
author2_variant | y q yq |
author_GND | http://id.loc.gov/authorities/names/n2007059654 |
author_facet | Qian, Yi, 1962- |
author_sort | Qian, Yi, 1962- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .I5247 2008eb |
callnumber-search | TK5105.59 .I5247 2008eb |
callnumber-sort | TK 45105.59 I5247 42008EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. |
ctrlnum | (OCoLC)190760120 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06955cam a2200901 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn190760120</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">080111s2008 ne a ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2007033726</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">B24X7</subfield><subfield code="d">VLB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">JBG</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">STF</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">OTZ</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">NLE</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKMGB</subfield><subfield code="d">LEAUB</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">BRF</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">EZC</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6H5404</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017585178</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">228148418</subfield><subfield code="a">473204748</subfield><subfield code="a">647692047</subfield><subfield code="a">961595880</subfield><subfield code="a">962700702</subfield><subfield code="a">984786104</subfield><subfield code="a">988441715</subfield><subfield code="a">991961986</subfield><subfield code="a">995040134</subfield><subfield code="a">1034977534</subfield><subfield code="a">1037793297</subfield><subfield code="a">1038674304</subfield><subfield code="a">1045455063</subfield><subfield code="a">1055378383</subfield><subfield code="a">1081286609</subfield><subfield code="a">1103267677</subfield><subfield code="a">1129355989</subfield><subfield code="a">1152985238</subfield><subfield code="a">1161999502</subfield><subfield code="a">1192342023</subfield><subfield code="a">1228545597</subfield><subfield code="a">1391569258</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080555881</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080555888</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281096172</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281096173</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611096175</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611096175</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780123735669</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0123735661</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)190760120</subfield><subfield code="z">(OCoLC)228148418</subfield><subfield code="z">(OCoLC)473204748</subfield><subfield code="z">(OCoLC)647692047</subfield><subfield code="z">(OCoLC)961595880</subfield><subfield code="z">(OCoLC)962700702</subfield><subfield code="z">(OCoLC)984786104</subfield><subfield code="z">(OCoLC)988441715</subfield><subfield code="z">(OCoLC)991961986</subfield><subfield code="z">(OCoLC)995040134</subfield><subfield code="z">(OCoLC)1034977534</subfield><subfield code="z">(OCoLC)1037793297</subfield><subfield code="z">(OCoLC)1038674304</subfield><subfield code="z">(OCoLC)1045455063</subfield><subfield code="z">(OCoLC)1055378383</subfield><subfield code="z">(OCoLC)1081286609</subfield><subfield code="z">(OCoLC)1103267677</subfield><subfield code="z">(OCoLC)1129355989</subfield><subfield code="z">(OCoLC)1152985238</subfield><subfield code="z">(OCoLC)1161999502</subfield><subfield code="z">(OCoLC)1192342023</subfield><subfield code="z">(OCoLC)1228545597</subfield><subfield code="z">(OCoLC)1391569258</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">134565:134696</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.I5247 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Information assurance :</subfield><subfield code="b">dependability and security in networked systems /</subfield><subfield code="c">[edited by] Yi Qian [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier/Morgan Kaufmann,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxvii, 537 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Morgan Kaufmann series in networking</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Morgan Kaufmann series in computer security</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Printbegrænsninger: Der kan printes kapitelvis.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Reliability.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Fiabilité.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Reliability.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Reliability</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">dissertations.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026039</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Thèses et écrits académiques.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qian, Yi,</subfield><subfield code="d">1962-</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2007059654</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Information assurance (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGW4xFKWXvdY9RgD6rYJcK</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Information assurance.</subfield><subfield code="d">Amsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008</subfield><subfield code="z">9780123735669</subfield><subfield code="z">0123735661</subfield><subfield code="w">(DLC) 2007033726</subfield><subfield code="w">(OCoLC)166290628</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Morgan Kaufmann series in networking.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no96046303</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Morgan Kaufmann series in computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007139011</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214765</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214765</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780123735669</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780123735669</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00037350</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10204358</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">214765</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2754827</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">informationassur0000unse</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf |
genre_facet | dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
id | ZDB-4-EBA-ocn190760120 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:35:59Z |
institution | BVB |
isbn | 9780080555881 0080555888 1281096172 9781281096173 9786611096175 6611096175 |
language | English |
oclc_num | 190760120 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xxxvii, 537 pages) : illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Elsevier/Morgan Kaufmann, |
record_format | marc |
series | Morgan Kaufmann series in networking. Morgan Kaufmann series in computer security. |
series2 | The Morgan Kaufmann series in networking The Morgan Kaufmann series in computer security |
spelling | Information assurance : dependability and security in networked systems / [edited by] Yi Qian [and others]. Amsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008. 1 online resource (xxxvii, 537 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier The Morgan Kaufmann series in networking The Morgan Kaufmann series in computer security Includes bibliographical references and index. PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks. Printbegrænsninger: Der kan printes kapitelvis. Print version record. English. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer networks Reliability. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Réseaux d'ordinateurs Fiabilité. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures. blmlsh Computer networks Reliability. blmlsh Computer security. blmlsh Computer networks Reliability fast Computer networks Security measures fast Computer security fast dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf Qian, Yi, 1962- http://id.loc.gov/authorities/names/n2007059654 has work: Information assurance (Text) https://id.oclc.org/worldcat/entity/E39PCGW4xFKWXvdY9RgD6rYJcK https://id.oclc.org/worldcat/ontology/hasWork Print version: Information assurance. Amsterdam ; Boston : Elsevier/Morgan Kaufmann, ©2008 9780123735669 0123735661 (DLC) 2007033726 (OCoLC)166290628 Morgan Kaufmann series in networking. http://id.loc.gov/authorities/names/no96046303 Morgan Kaufmann series in computer security. http://id.loc.gov/authorities/names/no2007139011 |
spellingShingle | Information assurance : dependability and security in networked systems / Morgan Kaufmann series in networking. Morgan Kaufmann series in computer security. PART I:Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems; / SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer networks Reliability. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Réseaux d'ordinateurs Fiabilité. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures. blmlsh Computer networks Reliability. blmlsh Computer security. blmlsh Computer networks Reliability fast Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/genreForms/gf2014026039 |
title | Information assurance : dependability and security in networked systems / |
title_auth | Information assurance : dependability and security in networked systems / |
title_exact_search | Information assurance : dependability and security in networked systems / |
title_full | Information assurance : dependability and security in networked systems / [edited by] Yi Qian [and others]. |
title_fullStr | Information assurance : dependability and security in networked systems / [edited by] Yi Qian [and others]. |
title_full_unstemmed | Information assurance : dependability and security in networked systems / [edited by] Yi Qian [and others]. |
title_short | Information assurance : |
title_sort | information assurance dependability and security in networked systems |
title_sub | dependability and security in networked systems / |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer networks Reliability. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Réseaux d'ordinateurs Fiabilité. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures. blmlsh Computer networks Reliability. blmlsh Computer security. blmlsh Computer networks Reliability fast Computer networks Security measures fast Computer security fast |
topic_facet | Computer networks Security measures. Computer networks Reliability. Computer security. Réseaux d'ordinateurs Sécurité Mesures. Réseaux d'ordinateurs Fiabilité. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Reliability Computer networks Security measures Computer security dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
work_keys_str_mv | AT qianyi informationassurancedependabilityandsecurityinnetworkedsystems |