서브메뉴
검색
Cyber security standards, practices and industrial applications- [electronic resource] : systems and methodologies
Cyber security standards, practices and industrial applications- [electronic resource] : systems and methodologies
상세정보
- 자료유형
- 단행본
- International Standard Book Number
- 9781609608521 (electronic bk.)
- International Standard Book Number
- 1609608526 (electronic bk.)
- International Standard Book Number
- 9781621989288 (electronic bk.)
- International Standard Book Number
- 1621989283 (electronic bk.)
- International Standard Book Number
- 9781609608514
- International Standard Book Number
- 1609608518
- International Standard Book Number
- 9781609608538
- International Standard Book Number
- 1609608534
- Library of Congress Call Number
- TK5105.59-.C92 2012eb
- Dewey Decimal Classification Number
- 005.8-22
- Publication, Distribution, etc. (Imprint
- Hershey, PA : Information Science Reference, c2012
- Physical Description
- 1 online resource (xviii, 316 p) : ill.
- General Note
- "Premier reference source"--Cover.
- Bibliography, Etc. Note
- Includes bibliographical references and index.
- Formatted Contents Note
- 완전내용Section 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security.
- Summary, Etc.
- 요약"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
- Subject Added Entry-Topical Term
- Computer networks Security measures
- Subject Added Entry-Topical Term
- Computer security
- Subject Added Entry-Topical Term
- Data protection
- Subject Added Entry-Topical Term
- Electronic data processing departments Security measures
- Subject Added Entry-Topical Term
- COMPUTERS / Internet / Security.
- Subject Added Entry-Topical Term
- COMPUTERS / Networking / Security.
- Subject Added Entry-Topical Term
- COMPUTERS / Security / General.
- Added Entry-Personal Name
- Zubairi, Junaid Ahmed , 1961-
- Added Entry-Personal Name
- Mahboob, Athar , 1971-
- Additional Physical Form Entry
- Print version Cyber security standards, practices and industrial applications. Hershey, PA : Information Science Reference, c2012 9781609608514 (DLC) 2011009262 (OCoLC)705717119
- Electronic Location and Access
- 로그인을 한후 보실 수 있는 자료입니다.
- Control Number
- joongbu:422401
MARC
008140102s2012 paua ob 001 0 eng d■001
■003OCoLC
■00520140127111319
■006m o d
■007cr cnu---unuuu
■019 ▼a786166930
■020 ▼a9781609608521 (electronic bk.)
■020 ▼a1609608526 (electronic bk.)
■020 ▼a9781621989288 (electronic bk.)
■020 ▼a1621989283 (electronic bk.)
■020 ▼z9781609608514
■020 ▼z1609608518
■020 ▼z9781609608538
■020 ▼z1609608534
■0291 ▼aAU@▼b000048562316
■0291 ▼aNZ1▼b14520979
■0291 ▼aNZ1▼b14522860
■035 ▼a(OCoLC)756496425
■037 ▼aCL0500000133▼bSafari Books Online
■040 ▼aN$T▼cN$T▼dYDXCP▼dE7B▼dCDX▼dUPM▼dUMI▼dUIU▼dGGVRL▼dOCLCQ▼dKNOVL
■050 4▼aTK5105.59▼b.C92 2012eb
■072 7▼aCOM▼x060040▼2bisacsh
■072 7▼aCOM▼x043050▼2bisacsh
■072 7▼aCOM▼x053000▼2bisacsh
■08204▼a005.8▼222
■24500▼aCyber security standards, practices and industrial applications▼h[electronic resource] ▼bsystems and methodologies▼d[edited by] Junaid Ahmed Zubairi, Athar Mahboob
■260 ▼aHershey, PA▼bInformation Science Reference▼cc2012
■300 ▼a1 online resource (xviii, 316 p) ▼bill.
■500 ▼a"Premier reference source"--Cover.
■504 ▼aIncludes bibliographical references and index.
■5050 ▼aSection 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security.
■520 ▼a"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
■588 ▼aDescription based on print version record.
■650 0▼aComputer networks▼xSecurity measures
■650 0▼aComputer security
■650 0▼aData protection
■650 0▼aElectronic data processing departments▼xSecurity measures
■650 7▼aCOMPUTERS / Internet / Security.▼2bisacsh
■650 7▼aCOMPUTERS / Networking / Security.▼2bisacsh
■650 7▼aCOMPUTERS / Security / General.▼2bisacsh
■655 4▼aElectronic books.
■7001 ▼aZubairi, Junaid Ahmed▼d1961-
■7001 ▼aMahboob, Athar▼d1971-
■77608▼iPrint version▼tCyber security standards, practices and industrial applications.▼dHershey, PA : Information Science Reference, c2012▼z9781609608514▼w(DLC) 2011009262▼w(OCoLC)705717119
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=389715
■938 ▼aYBP Library Services▼bYANK▼n3847105
■938 ▼aebrary▼bEBRY▼nebr10496727
■938 ▼aCoutts Information Services▼bCOUT▼n18625359
■938 ▼aCengage Learning▼bGVRL▼nGVRL6BAZ
■938 ▼aEBSCOhost▼bEBSC▼n389715
■994 ▼a92▼bK4R
■999 ▼z635217623907107158
미리보기
내보내기
chatGPT토론
Ai 추천 관련 도서
Buch Status
- Reservierung
- 캠퍼스간 도서대출
- 서가에 없는 책 신고
- Meine Mappe