Securing information and communications systems :: principles, technologies, and applications /
This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Artech House,
©2008.
|
Schriftenreihe: | Artech House information security and privacy series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems. |
Beschreibung: | 1 online resource (xiv, 362 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781596932296 1596932295 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn434586632 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 090829s2008 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d EBLCP |d OCLCQ |d MHW |d OCLCQ |d OCLCF |d DEBSZ |d OCLCQ |d NLGGC |d OCLCA |d YDXCP |d OCLCQ |d AZK |d LOA |d JBG |d AGLDB |d MOR |d ZCU |d OTZ |d LIV |d MERUC |d OCLCQ |d U3W |d OCLCA |d STF |d WRM |d OCLCQ |d VTS |d XOS |d NRAMU |d ICG |d OCLCQ |d INT |d CUY |d COO |d OCLCQ |d A6Q |d DKC |d OCLCQ |d M8D |d UKAHL |d OCLCQ |d UKCRE |d BRF |d OCLCO |d OCL |d OCLCQ |d OCLCO | ||
019 | |a 961546543 |a 962685774 |a 966197310 |a 988527987 |a 994922253 |a 1037929839 |a 1038566284 |a 1045516444 |a 1083557707 |a 1153556486 | ||
020 | |a 9781596932296 |q (electronic bk.) | ||
020 | |a 1596932295 |q (electronic bk.) | ||
020 | |z 1596932287 | ||
035 | |a (OCoLC)434586632 |z (OCoLC)961546543 |z (OCoLC)962685774 |z (OCoLC)966197310 |z (OCoLC)988527987 |z (OCoLC)994922253 |z (OCoLC)1037929839 |z (OCoLC)1038566284 |z (OCoLC)1045516444 |z (OCoLC)1083557707 |z (OCoLC)1153556486 | ||
050 | 4 | |a QA76.9.A25 |b S37563 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Securing information and communications systems : |b principles, technologies, and applications / |c Steven M. Furnell [and others], editors. |
260 | |a Boston : |b Artech House, |c ©2008. | ||
300 | |a 1 online resource (xiv, 362 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Artech House information security and privacy series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security. | |
520 | |a This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Public key infrastructure (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2002004634 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Infrastructure à clé publique (Sécurité informatique) | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Public key infrastructure (Computer security) |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
700 | 1 | |a Furnell, Steven, |d 1970- |0 http://id.loc.gov/authorities/names/n2001108205 | |
776 | 0 | 8 | |i Print version: |t Securing information and communications systems. |d Boston : Artech House, ©2008 |z 1596932287 |z 9781596932289 |w (DLC) 2008271231 |w (OCoLC)213468741 |
830 | 0 | |a Artech House information security and privacy series. |0 http://id.loc.gov/authorities/names/no2007048455 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284257 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH25703089 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL456881 | ||
938 | |a EBSCOhost |b EBSC |n 284257 | ||
938 | |a IEEE |b IEEE |n 9100352 | ||
938 | |a YBP Library Services |b YANK |n 3061288 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn434586632 |
---|---|
_version_ | 1816881696994230272 |
adam_text | |
any_adam_object | |
author2 | Furnell, Steven, 1970- |
author2_role | |
author2_variant | s f sf |
author_GND | http://id.loc.gov/authorities/names/n2001108205 |
author_facet | Furnell, Steven, 1970- |
author_sort | Furnell, Steven, 1970- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S37563 2008eb |
callnumber-search | QA76.9.A25 S37563 2008eb |
callnumber-sort | QA 276.9 A25 S37563 42008EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security. |
ctrlnum | (OCoLC)434586632 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04700cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn434586632</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">090829s2008 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCA</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">ZCU</subfield><subfield code="d">OTZ</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">XOS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">CUY</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BRF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">961546543</subfield><subfield code="a">962685774</subfield><subfield code="a">966197310</subfield><subfield code="a">988527987</subfield><subfield code="a">994922253</subfield><subfield code="a">1037929839</subfield><subfield code="a">1038566284</subfield><subfield code="a">1045516444</subfield><subfield code="a">1083557707</subfield><subfield code="a">1153556486</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932296</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932295</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1596932287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)434586632</subfield><subfield code="z">(OCoLC)961546543</subfield><subfield code="z">(OCoLC)962685774</subfield><subfield code="z">(OCoLC)966197310</subfield><subfield code="z">(OCoLC)988527987</subfield><subfield code="z">(OCoLC)994922253</subfield><subfield code="z">(OCoLC)1037929839</subfield><subfield code="z">(OCoLC)1038566284</subfield><subfield code="z">(OCoLC)1045516444</subfield><subfield code="z">(OCoLC)1083557707</subfield><subfield code="z">(OCoLC)1153556486</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S37563 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Securing information and communications systems :</subfield><subfield code="b">principles, technologies, and applications /</subfield><subfield code="c">Steven M. Furnell [and others], editors.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 362 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key infrastructure (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2002004634</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infrastructure à clé publique (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key infrastructure (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven,</subfield><subfield code="d">1970-</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001108205</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Securing information and communications systems.</subfield><subfield code="d">Boston : Artech House, ©2008</subfield><subfield code="z">1596932287</subfield><subfield code="z">9781596932289</subfield><subfield code="w">(DLC) 2008271231</subfield><subfield code="w">(OCoLC)213468741</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House information security and privacy series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007048455</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284257</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH25703089</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL456881</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">284257</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9100352</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3061288</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn434586632 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:50Z |
institution | BVB |
isbn | 9781596932296 1596932295 |
language | English |
oclc_num | 434586632 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xiv, 362 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Artech House, |
record_format | marc |
series | Artech House information security and privacy series. |
series2 | Artech House information security and privacy series |
spelling | Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell [and others], editors. Boston : Artech House, ©2008. 1 online resource (xiv, 362 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Artech House information security and privacy series Includes bibliographical references and index. Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security. This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems. Print version record. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Public key infrastructure (Computer security) http://id.loc.gov/authorities/subjects/sh2002004634 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Chiffrement (Informatique) Infrastructure à clé publique (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Public key infrastructure (Computer security) fast Computer networks Security measures fast Computer security fast Data encryption (Computer science) fast Furnell, Steven, 1970- http://id.loc.gov/authorities/names/n2001108205 Print version: Securing information and communications systems. Boston : Artech House, ©2008 1596932287 9781596932289 (DLC) 2008271231 (OCoLC)213468741 Artech House information security and privacy series. http://id.loc.gov/authorities/names/no2007048455 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284257 Volltext |
spellingShingle | Securing information and communications systems : principles, technologies, and applications / Artech House information security and privacy series. Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Public key infrastructure (Computer security) http://id.loc.gov/authorities/subjects/sh2002004634 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Chiffrement (Informatique) Infrastructure à clé publique (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Public key infrastructure (Computer security) fast Computer networks Security measures fast Computer security fast Data encryption (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh94001524 http://id.loc.gov/authorities/subjects/sh2002004634 https://id.nlm.nih.gov/mesh/D016494 |
title | Securing information and communications systems : principles, technologies, and applications / |
title_auth | Securing information and communications systems : principles, technologies, and applications / |
title_exact_search | Securing information and communications systems : principles, technologies, and applications / |
title_full | Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell [and others], editors. |
title_fullStr | Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell [and others], editors. |
title_full_unstemmed | Securing information and communications systems : principles, technologies, and applications / Steven M. Furnell [and others], editors. |
title_short | Securing information and communications systems : |
title_sort | securing information and communications systems principles technologies and applications |
title_sub | principles, technologies, and applications / |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Public key infrastructure (Computer security) http://id.loc.gov/authorities/subjects/sh2002004634 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Chiffrement (Informatique) Infrastructure à clé publique (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Public key infrastructure (Computer security) fast Computer networks Security measures fast Computer security fast Data encryption (Computer science) fast |
topic_facet | Computer security. Computer networks Security measures. Data encryption (Computer science) Public key infrastructure (Computer security) Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Chiffrement (Informatique) Infrastructure à clé publique (Sécurité informatique) COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284257 |
work_keys_str_mv | AT furnellsteven securinginformationandcommunicationssystemsprinciplestechnologiesandapplications |