Handbook of security and networks /:
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioner...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hackensack, NJ :
World Scientific,
©2011.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic. |
Beschreibung: | 1 online resource (xxi, 551 pages :) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9789814273046 981427304X |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn755587690 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 111003s2011 njua ob 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d E7B |d OTZ |d UIU |d OCLCQ |d DEBSZ |d OCLCQ |d NLGGC |d OCLCQ |d OCLCF |d OCLCQ |d AGLDB |d OCLCQ |d OCLCO |d JBG |d DEBBG |d VTS |d CNCGM |d OCLCA |d AU@ |d OCLCO |d OCLCQ |d STF |d UKAHL |d OCLCQ |d AJS |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9789814273046 |q (electronic bk.) | ||
020 | |a 981427304X |q (electronic bk.) | ||
020 | |z 9789814273039 | ||
020 | |z 9814273031 | ||
035 | |a (OCoLC)755587690 | ||
050 | 4 | |a TK5105.59 |b .H36 2011eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Handbook of security and networks / |c editors, Yang Xiao, Frank H Li, Hui Chen. |
260 | |a Hackensack, NJ : |b World Scientific, |c ©2011. | ||
300 | |a 1 online resource (xxi, 551 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a pt. 1. Overview of network security -- pt. 2. Attacks on networks -- pt. 3. Key and key management -- pt. 4. Malware -- pt. 5. Latest security-related topics on computer networking. | |
520 | |a This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Rechnernetz |2 gnd |0 http://d-nb.info/gnd/4070085-9 | |
655 | 4 | |a Aufsatzsammlung. | |
700 | 1 | |a Xiao, Yang, |d 1966- |1 https://id.oclc.org/worldcat/entity/E39PBJj4tyP33mkvqQ3Qt3fXh3 |0 http://id.loc.gov/authorities/names/n2007185524 | |
700 | 1 | |a Li, Frank Haizhon. | |
700 | 1 | |a Chen, Hui, |d 1972- |1 https://id.oclc.org/worldcat/entity/E39PCjxJmTkTkPpxW4x8MPwTtq |0 http://id.loc.gov/authorities/names/n2007185525 | |
758 | |i has work: |a Handbook of security and networks (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFKGcfGhp4BW4FxbK8dPHy |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Handbook of security and networks. |d Hackensack, NJ : World Scientific, ©2011 |z 9789814273039 |w (OCoLC)299716367 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=389612 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=389612 |3 Volltext | |
938 | |a Askews and Holts Library Services |b ASKH |n AH25565173 | ||
938 | |a ebrary |b EBRY |n ebr10493538 | ||
938 | |a EBSCOhost |b EBSC |n 389612 | ||
938 | |a YBP Library Services |b YANK |n 7135047 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn755587690 |
---|---|
_version_ | 1813903413881077760 |
adam_text | |
any_adam_object | |
author2 | Xiao, Yang, 1966- Li, Frank Haizhon Chen, Hui, 1972- |
author2_role | |
author2_variant | y x yx f h l fh fhl h c hc |
author_GND | http://id.loc.gov/authorities/names/n2007185524 http://id.loc.gov/authorities/names/n2007185525 |
author_facet | Xiao, Yang, 1966- Li, Frank Haizhon Chen, Hui, 1972- |
author_sort | Xiao, Yang, 1966- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .H36 2011eb |
callnumber-search | TK5105.59 .H36 2011eb |
callnumber-sort | TK 45105.59 H36 42011EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | pt. 1. Overview of network security -- pt. 2. Attacks on networks -- pt. 3. Key and key management -- pt. 4. Malware -- pt. 5. Latest security-related topics on computer networking. |
ctrlnum | (OCoLC)755587690 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03695cam a2200601 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn755587690</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">111003s2011 njua ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">OTZ</subfield><subfield code="d">UIU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">JBG</subfield><subfield code="d">DEBBG</subfield><subfield code="d">VTS</subfield><subfield code="d">CNCGM</subfield><subfield code="d">OCLCA</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814273046</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981427304X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789814273039</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9814273031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)755587690</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.H36 2011eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of security and networks /</subfield><subfield code="c">editors, Yang Xiao, Frank H Li, Hui Chen.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hackensack, NJ :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">©2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 551 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. Overview of network security -- pt. 2. Attacks on networks -- pt. 3. Key and key management -- pt. 4. Malware -- pt. 5. Latest security-related topics on computer networking.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4070085-9</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Aufsatzsammlung.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiao, Yang,</subfield><subfield code="d">1966-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJj4tyP33mkvqQ3Qt3fXh3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2007185524</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Frank Haizhon.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Hui,</subfield><subfield code="d">1972-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjxJmTkTkPpxW4x8MPwTtq</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2007185525</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Handbook of security and networks (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFKGcfGhp4BW4FxbK8dPHy</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Handbook of security and networks.</subfield><subfield code="d">Hackensack, NJ : World Scientific, ©2011</subfield><subfield code="z">9789814273039</subfield><subfield code="w">(OCoLC)299716367</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=389612</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=389612</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH25565173</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10493538</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">389612</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7135047</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
genre | Aufsatzsammlung. |
genre_facet | Aufsatzsammlung. |
id | ZDB-4-EBA-ocn755587690 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:18:18Z |
institution | BVB |
isbn | 9789814273046 981427304X |
language | English |
oclc_num | 755587690 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxi, 551 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | World Scientific, |
record_format | marc |
spelling | Handbook of security and networks / editors, Yang Xiao, Frank H Li, Hui Chen. Hackensack, NJ : World Scientific, ©2011. 1 online resource (xxi, 551 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references. Print version record. pt. 1. Overview of network security -- pt. 2. Attacks on networks -- pt. 3. Key and key management -- pt. 4. Malware -- pt. 5. Latest security-related topics on computer networking. This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computersicherheit gnd Rechnernetz gnd http://d-nb.info/gnd/4070085-9 Aufsatzsammlung. Xiao, Yang, 1966- https://id.oclc.org/worldcat/entity/E39PBJj4tyP33mkvqQ3Qt3fXh3 http://id.loc.gov/authorities/names/n2007185524 Li, Frank Haizhon. Chen, Hui, 1972- https://id.oclc.org/worldcat/entity/E39PCjxJmTkTkPpxW4x8MPwTtq http://id.loc.gov/authorities/names/n2007185525 has work: Handbook of security and networks (Text) https://id.oclc.org/worldcat/entity/E39PCFKGcfGhp4BW4FxbK8dPHy https://id.oclc.org/worldcat/ontology/hasWork Print version: Handbook of security and networks. Hackensack, NJ : World Scientific, ©2011 9789814273039 (OCoLC)299716367 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=389612 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=389612 Volltext |
spellingShingle | Handbook of security and networks / pt. 1. Overview of network security -- pt. 2. Attacks on networks -- pt. 3. Key and key management -- pt. 4. Malware -- pt. 5. Latest security-related topics on computer networking. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computersicherheit gnd Rechnernetz gnd http://d-nb.info/gnd/4070085-9 |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://d-nb.info/gnd/4070085-9 |
title | Handbook of security and networks / |
title_auth | Handbook of security and networks / |
title_exact_search | Handbook of security and networks / |
title_full | Handbook of security and networks / editors, Yang Xiao, Frank H Li, Hui Chen. |
title_fullStr | Handbook of security and networks / editors, Yang Xiao, Frank H Li, Hui Chen. |
title_full_unstemmed | Handbook of security and networks / editors, Yang Xiao, Frank H Li, Hui Chen. |
title_short | Handbook of security and networks / |
title_sort | handbook of security and networks |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computersicherheit gnd Rechnernetz gnd http://d-nb.info/gnd/4070085-9 |
topic_facet | Computer networks Security measures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computersicherheit Rechnernetz Aufsatzsammlung. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=389612 |
work_keys_str_mv | AT xiaoyang handbookofsecurityandnetworks AT lifrankhaizhon handbookofsecurityandnetworks AT chenhui handbookofsecurityandnetworks |