Aspects of network and information security /:
Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specif...
Gespeichert in:
Körperschaften: | , , , |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington D.C. :
IOS Press,
©2008.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security ;
v. 17. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques. |
Beschreibung: | "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005." "Published in cooperation with NATO Public Diplomacy Division." |
Beschreibung: | 1 online resource (ix, 355 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781607503262 1607503263 9781435677999 1435677994 9786000006358 6000006357 |
ISSN: | 1874-6268 ; |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn491261484 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 091221s2008 ne a ob 101 0 eng d | ||
010 | |a 2008928730 | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d IOSPR |d N$T |d MEAUC |d IDEBK |d E7B |d OCLCQ |d ALAUL |d OCLCQ |d OCLCF |d OCLCQ |d OCLCO |d YDXCP |d OCLCQ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d AZK |d LOA |d COCUF |d AGLDB |d MOR |d PIFAG |d OCLCQ |d STF |d WRM |d VTS |d NRAMU |d VT2 |d OCLCQ |d WYU |d ICG |d M8D |d UKCRE |d UKAHL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 283799162 |a 503443999 |a 646786509 |a 961563638 |a 962626296 |a 966144930 |a 988411189 |a 991920930 |a 1037784035 |a 1038593640 |a 1045474512 |a 1055349775 |a 1066442879 |a 1077247622 |a 1081217655 |a 1153459251 |a 1228586715 | ||
020 | |a 9781607503262 | ||
020 | |a 1607503263 | ||
020 | |a 9781435677999 |q (electronic bk.) | ||
020 | |a 1435677994 |q (electronic bk.) | ||
020 | |a 9786000006358 |q (ebook) | ||
020 | |a 6000006357 |q (ebook) | ||
020 | |z 1586038567 | ||
020 | |z 9781586038564 | ||
035 | |a (OCoLC)491261484 |z (OCoLC)283799162 |z (OCoLC)503443999 |z (OCoLC)646786509 |z (OCoLC)961563638 |z (OCoLC)962626296 |z (OCoLC)966144930 |z (OCoLC)988411189 |z (OCoLC)991920930 |z (OCoLC)1037784035 |z (OCoLC)1038593640 |z (OCoLC)1045474512 |z (OCoLC)1055349775 |z (OCoLC)1066442879 |z (OCoLC)1077247622 |z (OCoLC)1081217655 |z (OCoLC)1153459251 |z (OCoLC)1228586715 | ||
037 | |a 978-1-58603-856-4 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a TK5105.59 |b .A87 2008eb | |
072 | 7 | |a COM |x SOC000000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Study Institute on Network Security and Intrusion Detection |d (2005 : |c Yerevan, Armenia) |0 http://id.loc.gov/authorities/names/nb2008017554 | |
245 | 1 | 0 | |a Aspects of network and information security / |c edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian. |
260 | |a Amsterdam ; |a Washington D.C. : |b IOS Press, |c ©2008. | ||
300 | |a 1 online resource (ix, 355 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a NATO science for peace and security series. Sub-series D: Information and communication security, |x 1874-6268 ; |v v. 17 | |
500 | |a "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005." | ||
500 | |a "Published in cooperation with NATO Public Diplomacy Division." | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |g Preface -- Section I: Network security: |t Network security and survivability: using wireless overlay networks for critical infrastructure protection / |r M. Bermester -- |t Security when routers are taken over by the adversary / |r Y. Desmedt -- |t Security in quantum cryptography and quantum networks / |r J. Gruska -- |t The case for self-healing software / |r A.D. Keromytis -- |t Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" / |r I. Kotenko -- |t Formal treatment of secure protocols: an introduction / |r D. Krizanc, J. Lipton -- |t Behavioral and structural properties of malicious code / |r C. Kruegel -- |t Security from the practitioner's point of view / |r M. Oit -- |t Mobile and wireless communications security / |r B. Preneel -- |t Humanitarian problems in information security / |r V. Tairyan [and others] -- |t Multimedia security: open problems and solutions / |r S. Voloshynovskiy [and others] -- |t A selective introduction to border gateway protocol (BGP) security issues / |r T. Wan, P.C. van Oorschot, E. Kranakis -- |g Section II: Information security: |t Steganography & steganalysis an overview of research & challenges / |r S.S. Agaian -- |t Guessing and cryptography / |r E. Arikan -- |t The exact approximate encryption of quantum information / |r J. Bouda -- |t A new approach to stochastic quantum processes, their manipulation and control / |r A. Gevorkyan -- |t Reliability approach in Wiretapper guessing theory / |r E.A. Haroutunian -- |t E-capacity of information hiding systems / |r M.E. Haroutunian -- |t Quasicrystals in cryptography / |r J. Patera, M. Nesterenko -- |t Asymptotic investigation of mutual information and capacity of certain communication channels / |r V. Prelov -- |t Information theory of covert timing channels / |r A.B Wagner, V. Anantharam -- |g Section III: Coding: |t A survey of new results in coding with feedback and searching with lies / |r C. Deppe -- |t Remarks on e-optimal rate function in DMS coding / |r A. Harutyunyan -- |t Reconstruction of data distorted by some errors / |r E. Konstantinova -- |t On (w, r) cover-free codes / |r V. Lebedev -- |t Switching methods for error-correcting codes / |r F. Solovéva -- |t On reconstruction of functions on the hypercube / |r A. Vasiléva. |
520 | |a Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. | |
650 | 0 | |a Information networks |x Security measures |v Congresses. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Congrès. | |
650 | 6 | |a Réseaux d'information |x Sécurité |x Mesures |v Congrès. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Information networks |x Security measures |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Kranakis, Evangelos. | |
700 | 1 | |a Haroutunian, Evgueni A. | |
700 | 1 | |a Shahbazian, E. |q (Elisa) |0 http://id.loc.gov/authorities/names/n2002013746 | |
710 | 2 | |a North Atlantic Treaty Organization. |b Public Diplomacy Division. |0 http://id.loc.gov/authorities/names/nb2004313249 | |
710 | 2 | |a NATO Science for Peace and Security Programme. |0 http://id.loc.gov/authorities/names/no2007094951 | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
758 | |i has work: |a Aspects of network and information security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFCYqdch3y4FdhcJ69grhd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia). |t Aspects of network and information security. |d Amsterdam ; Washington D.C. : IOS Press, ©2008 |z 9781586038564 |z 1586038567 |w (DLC) 2008928730 |w (OCoLC)244320577 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security ; |v v. 17. |0 http://id.loc.gov/authorities/names/no2007140990 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244467 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH28330266 | ||
938 | |a EBSCOhost |b EBSC |n 244467 | ||
938 | |a YBP Library Services |b YANK |n 2919812 | ||
938 | |a YBP Library Services |b YANK |n 3318027 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn491261484 |
---|---|
_version_ | 1816881702107086849 |
adam_text | |
any_adam_object | |
author2 | Kranakis, Evangelos Haroutunian, Evgueni A. Shahbazian, E. (Elisa) |
author2_role | |
author2_variant | e k ek e a h ea eah e s es |
author_GND | http://id.loc.gov/authorities/names/n2002013746 |
author_additional | M. Bermester -- Y. Desmedt -- J. Gruska -- A.D. Keromytis -- I. Kotenko -- D. Krizanc, J. Lipton -- C. Kruegel -- M. Oit -- B. Preneel -- V. Tairyan [and others] -- S. Voloshynovskiy [and others] -- T. Wan, P.C. van Oorschot, E. Kranakis -- S.S. Agaian -- E. Arikan -- J. Bouda -- A. Gevorkyan -- E.A. Haroutunian -- M.E. Haroutunian -- J. Patera, M. Nesterenko -- V. Prelov -- A.B Wagner, V. Anantharam -- C. Deppe -- A. Harutyunyan -- E. Konstantinova -- V. Lebedev -- F. Solovéva -- A. Vasiléva. |
author_corporate | NATO Advanced Study Institute on Network Security and Intrusion Detection Yerevan, Armenia North Atlantic Treaty Organization. Public Diplomacy Division NATO Science for Peace and Security Programme IOS Press |
author_corporate_role | |
author_facet | Kranakis, Evangelos Haroutunian, Evgueni A. Shahbazian, E. (Elisa) NATO Advanced Study Institute on Network Security and Intrusion Detection Yerevan, Armenia North Atlantic Treaty Organization. Public Diplomacy Division NATO Science for Peace and Security Programme IOS Press |
author_sort | NATO Advanced Study Institute on Network Security and Intrusion Detection Yerevan, Armenia |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .A87 2008eb |
callnumber-search | TK5105.59 .A87 2008eb |
callnumber-sort | TK 45105.59 A87 42008EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Network security and survivability: using wireless overlay networks for critical infrastructure protection / Security when routers are taken over by the adversary / Security in quantum cryptography and quantum networks / The case for self-healing software / Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" / Formal treatment of secure protocols: an introduction / Behavioral and structural properties of malicious code / Security from the practitioner's point of view / Mobile and wireless communications security / Humanitarian problems in information security / Multimedia security: open problems and solutions / A selective introduction to border gateway protocol (BGP) security issues / Steganography & steganalysis an overview of research & challenges / Guessing and cryptography / The exact approximate encryption of quantum information / A new approach to stochastic quantum processes, their manipulation and control / Reliability approach in Wiretapper guessing theory / E-capacity of information hiding systems / Quasicrystals in cryptography / Asymptotic investigation of mutual information and capacity of certain communication channels / Information theory of covert timing channels / A survey of new results in coding with feedback and searching with lies / Remarks on e-optimal rate function in DMS coding / Reconstruction of data distorted by some errors / On (w, r) cover-free codes / Switching methods for error-correcting codes / On reconstruction of functions on the hypercube / |
ctrlnum | (OCoLC)491261484 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08209cam a2200781 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn491261484</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">091221s2008 ne a ob 101 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2008928730</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">MEAUC</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ALAUL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">ICG</subfield><subfield code="d">M8D</subfield><subfield code="d">UKCRE</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">283799162</subfield><subfield code="a">503443999</subfield><subfield code="a">646786509</subfield><subfield code="a">961563638</subfield><subfield code="a">962626296</subfield><subfield code="a">966144930</subfield><subfield code="a">988411189</subfield><subfield code="a">991920930</subfield><subfield code="a">1037784035</subfield><subfield code="a">1038593640</subfield><subfield code="a">1045474512</subfield><subfield code="a">1055349775</subfield><subfield code="a">1066442879</subfield><subfield code="a">1077247622</subfield><subfield code="a">1081217655</subfield><subfield code="a">1153459251</subfield><subfield code="a">1228586715</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607503262</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607503263</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435677999</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435677994</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786000006358</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6000006357</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1586038567</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781586038564</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)491261484</subfield><subfield code="z">(OCoLC)283799162</subfield><subfield code="z">(OCoLC)503443999</subfield><subfield code="z">(OCoLC)646786509</subfield><subfield code="z">(OCoLC)961563638</subfield><subfield code="z">(OCoLC)962626296</subfield><subfield code="z">(OCoLC)966144930</subfield><subfield code="z">(OCoLC)988411189</subfield><subfield code="z">(OCoLC)991920930</subfield><subfield code="z">(OCoLC)1037784035</subfield><subfield code="z">(OCoLC)1038593640</subfield><subfield code="z">(OCoLC)1045474512</subfield><subfield code="z">(OCoLC)1055349775</subfield><subfield code="z">(OCoLC)1066442879</subfield><subfield code="z">(OCoLC)1077247622</subfield><subfield code="z">(OCoLC)1081217655</subfield><subfield code="z">(OCoLC)1153459251</subfield><subfield code="z">(OCoLC)1228586715</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-58603-856-4</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.A87 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">SOC000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute on Network Security and Intrusion Detection</subfield><subfield code="d">(2005 :</subfield><subfield code="c">Yerevan, Armenia)</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2008017554</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Aspects of network and information security /</subfield><subfield code="c">edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington D.C. :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 355 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO science for peace and security series. Sub-series D: Information and communication security,</subfield><subfield code="x">1874-6268 ;</subfield><subfield code="v">v. 17</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Published in cooperation with NATO Public Diplomacy Division."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="g">Preface -- Section I: Network security:</subfield><subfield code="t">Network security and survivability: using wireless overlay networks for critical infrastructure protection /</subfield><subfield code="r">M. Bermester --</subfield><subfield code="t">Security when routers are taken over by the adversary /</subfield><subfield code="r">Y. Desmedt --</subfield><subfield code="t">Security in quantum cryptography and quantum networks /</subfield><subfield code="r">J. Gruska --</subfield><subfield code="t">The case for self-healing software /</subfield><subfield code="r">A.D. Keromytis --</subfield><subfield code="t">Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" /</subfield><subfield code="r">I. Kotenko --</subfield><subfield code="t">Formal treatment of secure protocols: an introduction /</subfield><subfield code="r">D. Krizanc, J. Lipton --</subfield><subfield code="t">Behavioral and structural properties of malicious code /</subfield><subfield code="r">C. Kruegel --</subfield><subfield code="t">Security from the practitioner's point of view /</subfield><subfield code="r">M. Oit --</subfield><subfield code="t">Mobile and wireless communications security /</subfield><subfield code="r">B. Preneel --</subfield><subfield code="t">Humanitarian problems in information security /</subfield><subfield code="r">V. Tairyan [and others] --</subfield><subfield code="t">Multimedia security: open problems and solutions /</subfield><subfield code="r">S. Voloshynovskiy [and others] --</subfield><subfield code="t">A selective introduction to border gateway protocol (BGP) security issues /</subfield><subfield code="r">T. Wan, P.C. van Oorschot, E. Kranakis --</subfield><subfield code="g">Section II: Information security:</subfield><subfield code="t">Steganography & steganalysis an overview of research & challenges /</subfield><subfield code="r">S.S. Agaian --</subfield><subfield code="t">Guessing and cryptography /</subfield><subfield code="r">E. Arikan --</subfield><subfield code="t">The exact approximate encryption of quantum information /</subfield><subfield code="r">J. Bouda --</subfield><subfield code="t">A new approach to stochastic quantum processes, their manipulation and control /</subfield><subfield code="r">A. Gevorkyan --</subfield><subfield code="t">Reliability approach in Wiretapper guessing theory /</subfield><subfield code="r">E.A. Haroutunian --</subfield><subfield code="t">E-capacity of information hiding systems /</subfield><subfield code="r">M.E. Haroutunian --</subfield><subfield code="t">Quasicrystals in cryptography /</subfield><subfield code="r">J. Patera, M. Nesterenko --</subfield><subfield code="t">Asymptotic investigation of mutual information and capacity of certain communication channels /</subfield><subfield code="r">V. Prelov --</subfield><subfield code="t">Information theory of covert timing channels /</subfield><subfield code="r">A.B Wagner, V. Anantharam --</subfield><subfield code="g">Section III: Coding:</subfield><subfield code="t">A survey of new results in coding with feedback and searching with lies /</subfield><subfield code="r">C. Deppe --</subfield><subfield code="t">Remarks on e-optimal rate function in DMS coding /</subfield><subfield code="r">A. Harutyunyan --</subfield><subfield code="t">Reconstruction of data distorted by some errors /</subfield><subfield code="r">E. Konstantinova --</subfield><subfield code="t">On (w, r) cover-free codes /</subfield><subfield code="r">V. Lebedev --</subfield><subfield code="t">Switching methods for error-correcting codes /</subfield><subfield code="r">F. Solovéva --</subfield><subfield code="t">On reconstruction of functions on the hypercube /</subfield><subfield code="r">A. Vasiléva.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kranakis, Evangelos.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haroutunian, Evgueni A.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shahbazian, E.</subfield><subfield code="q">(Elisa)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2002013746</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">North Atlantic Treaty Organization.</subfield><subfield code="b">Public Diplomacy Division.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2004313249</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">NATO Science for Peace and Security Programme.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007094951</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Aspects of network and information security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFCYqdch3y4FdhcJ69grhd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia).</subfield><subfield code="t">Aspects of network and information security.</subfield><subfield code="d">Amsterdam ; Washington D.C. : IOS Press, ©2008</subfield><subfield code="z">9781586038564</subfield><subfield code="z">1586038567</subfield><subfield code="w">(DLC) 2008928730</subfield><subfield code="w">(OCoLC)244320577</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">v. 17.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244467</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH28330266</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">244467</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2919812</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3318027</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn491261484 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:55Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/nb2008017554 http://id.loc.gov/authorities/names/nb2004313249 http://id.loc.gov/authorities/names/no2007094951 http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781607503262 1607503263 9781435677999 1435677994 9786000006358 6000006357 |
issn | 1874-6268 ; |
language | English |
lccn | 2008928730 |
oclc_num | 491261484 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (ix, 355 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security ; |
series2 | NATO science for peace and security series. Sub-series D: Information and communication security, |
spelling | NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia) http://id.loc.gov/authorities/names/nb2008017554 Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian. Amsterdam ; Washington D.C. : IOS Press, ©2008. 1 online resource (ix, 355 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file NATO science for peace and security series. Sub-series D: Information and communication security, 1874-6268 ; v. 17 "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005." "Published in cooperation with NATO Public Diplomacy Division." Includes bibliographical references and index. Preface -- Section I: Network security: Network security and survivability: using wireless overlay networks for critical infrastructure protection / M. Bermester -- Security when routers are taken over by the adversary / Y. Desmedt -- Security in quantum cryptography and quantum networks / J. Gruska -- The case for self-healing software / A.D. Keromytis -- Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" / I. Kotenko -- Formal treatment of secure protocols: an introduction / D. Krizanc, J. Lipton -- Behavioral and structural properties of malicious code / C. Kruegel -- Security from the practitioner's point of view / M. Oit -- Mobile and wireless communications security / B. Preneel -- Humanitarian problems in information security / V. Tairyan [and others] -- Multimedia security: open problems and solutions / S. Voloshynovskiy [and others] -- A selective introduction to border gateway protocol (BGP) security issues / T. Wan, P.C. van Oorschot, E. Kranakis -- Section II: Information security: Steganography & steganalysis an overview of research & challenges / S.S. Agaian -- Guessing and cryptography / E. Arikan -- The exact approximate encryption of quantum information / J. Bouda -- A new approach to stochastic quantum processes, their manipulation and control / A. Gevorkyan -- Reliability approach in Wiretapper guessing theory / E.A. Haroutunian -- E-capacity of information hiding systems / M.E. Haroutunian -- Quasicrystals in cryptography / J. Patera, M. Nesterenko -- Asymptotic investigation of mutual information and capacity of certain communication channels / V. Prelov -- Information theory of covert timing channels / A.B Wagner, V. Anantharam -- Section III: Coding: A survey of new results in coding with feedback and searching with lies / C. Deppe -- Remarks on e-optimal rate function in DMS coding / A. Harutyunyan -- Reconstruction of data distorted by some errors / E. Konstantinova -- On (w, r) cover-free codes / V. Lebedev -- Switching methods for error-correcting codes / F. Solovéva -- On reconstruction of functions on the hypercube / A. Vasiléva. Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques. Print version record. Computer networks Security measures Congresses. Information networks Security measures Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'information Sécurité Mesures Congrès. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Information networks Security measures fast Conference papers and proceedings fast Kranakis, Evangelos. Haroutunian, Evgueni A. Shahbazian, E. (Elisa) http://id.loc.gov/authorities/names/n2002013746 North Atlantic Treaty Organization. Public Diplomacy Division. http://id.loc.gov/authorities/names/nb2004313249 NATO Science for Peace and Security Programme. http://id.loc.gov/authorities/names/no2007094951 IOS Press. http://id.loc.gov/authorities/names/no2015091156 has work: Aspects of network and information security (Text) https://id.oclc.org/worldcat/entity/E39PCFCYqdch3y4FdhcJ69grhd https://id.oclc.org/worldcat/ontology/hasWork Print version: NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia). Aspects of network and information security. Amsterdam ; Washington D.C. : IOS Press, ©2008 9781586038564 1586038567 (DLC) 2008928730 (OCoLC)244320577 NATO science for peace and security series. Sub-series D, Information and communication security ; v. 17. http://id.loc.gov/authorities/names/no2007140990 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244467 Volltext |
spellingShingle | Aspects of network and information security / NATO science for peace and security series. Information and communication security ; Network security and survivability: using wireless overlay networks for critical infrastructure protection / Security when routers are taken over by the adversary / Security in quantum cryptography and quantum networks / The case for self-healing software / Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" / Formal treatment of secure protocols: an introduction / Behavioral and structural properties of malicious code / Security from the practitioner's point of view / Mobile and wireless communications security / Humanitarian problems in information security / Multimedia security: open problems and solutions / A selective introduction to border gateway protocol (BGP) security issues / Steganography & steganalysis an overview of research & challenges / Guessing and cryptography / The exact approximate encryption of quantum information / A new approach to stochastic quantum processes, their manipulation and control / Reliability approach in Wiretapper guessing theory / E-capacity of information hiding systems / Quasicrystals in cryptography / Asymptotic investigation of mutual information and capacity of certain communication channels / Information theory of covert timing channels / A survey of new results in coding with feedback and searching with lies / Remarks on e-optimal rate function in DMS coding / Reconstruction of data distorted by some errors / On (w, r) cover-free codes / Switching methods for error-correcting codes / On reconstruction of functions on the hypercube / Computer networks Security measures Congresses. Information networks Security measures Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'information Sécurité Mesures Congrès. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Information networks Security measures fast |
title | Aspects of network and information security / |
title_alt | Network security and survivability: using wireless overlay networks for critical infrastructure protection / Security when routers are taken over by the adversary / Security in quantum cryptography and quantum networks / The case for self-healing software / Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" / Formal treatment of secure protocols: an introduction / Behavioral and structural properties of malicious code / Security from the practitioner's point of view / Mobile and wireless communications security / Humanitarian problems in information security / Multimedia security: open problems and solutions / A selective introduction to border gateway protocol (BGP) security issues / Steganography & steganalysis an overview of research & challenges / Guessing and cryptography / The exact approximate encryption of quantum information / A new approach to stochastic quantum processes, their manipulation and control / Reliability approach in Wiretapper guessing theory / E-capacity of information hiding systems / Quasicrystals in cryptography / Asymptotic investigation of mutual information and capacity of certain communication channels / Information theory of covert timing channels / A survey of new results in coding with feedback and searching with lies / Remarks on e-optimal rate function in DMS coding / Reconstruction of data distorted by some errors / On (w, r) cover-free codes / Switching methods for error-correcting codes / On reconstruction of functions on the hypercube / |
title_auth | Aspects of network and information security / |
title_exact_search | Aspects of network and information security / |
title_full | Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian. |
title_fullStr | Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian. |
title_full_unstemmed | Aspects of network and information security / edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian. |
title_short | Aspects of network and information security / |
title_sort | aspects of network and information security |
topic | Computer networks Security measures Congresses. Information networks Security measures Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'information Sécurité Mesures Congrès. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Information networks Security measures fast |
topic_facet | Computer networks Security measures Congresses. Information networks Security measures Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'information Sécurité Mesures Congrès. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Information networks Security measures Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244467 |
work_keys_str_mv | AT natoadvancedstudyinstituteonnetworksecurityandintrusiondetectionyerevanarmenia aspectsofnetworkandinformationsecurity AT kranakisevangelos aspectsofnetworkandinformationsecurity AT haroutunianevguenia aspectsofnetworkandinformationsecurity AT shahbaziane aspectsofnetworkandinformationsecurity AT northatlantictreatyorganizationpublicdiplomacydivision aspectsofnetworkandinformationsecurity AT natoscienceforpeaceandsecurityprogramme aspectsofnetworkandinformationsecurity AT iospress aspectsofnetworkandinformationsecurity |