본문

서브메뉴

Cyber security standards, practices and industrial applications- [electronic resource] : systems and methodologies
Cyber security standards, practices and industrial applications- [electronic resource] : systems and methodologies

상세정보

자료유형  
 단행본
International Standard Book Number  
9781609608521 (electronic bk.)
International Standard Book Number  
1609608526 (electronic bk.)
International Standard Book Number  
9781621989288 (electronic bk.)
International Standard Book Number  
1621989283 (electronic bk.)
International Standard Book Number  
9781609608514
International Standard Book Number  
1609608518
International Standard Book Number  
9781609608538
International Standard Book Number  
1609608534
Library of Congress Call Number  
TK5105.59-.C92 2012eb
Dewey Decimal Classification Number  
005.8-22
Publication, Distribution, etc. (Imprint  
Hershey, PA : Information Science Reference, c2012
Physical Description  
1 online resource (xviii, 316 p) : ill.
General Note  
"Premier reference source"--Cover.
Bibliography, Etc. Note  
Includes bibliographical references and index.
Formatted Contents Note  
완전내용Section 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security.
Summary, Etc.  
요약"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
Subject Added Entry-Topical Term  
Computer networks Security measures
Subject Added Entry-Topical Term  
Computer security
Subject Added Entry-Topical Term  
Data protection
Subject Added Entry-Topical Term  
Electronic data processing departments Security measures
Subject Added Entry-Topical Term  
COMPUTERS / Internet / Security.
Subject Added Entry-Topical Term  
COMPUTERS / Networking / Security.
Subject Added Entry-Topical Term  
COMPUTERS / Security / General.
Added Entry-Personal Name  
Zubairi, Junaid Ahmed , 1961-
Added Entry-Personal Name  
Mahboob, Athar , 1971-
Additional Physical Form Entry  
Print version Cyber security standards, practices and industrial applications. Hershey, PA : Information Science Reference, c2012 9781609608514 (DLC) 2011009262 (OCoLC)705717119
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:422401

MARC

 008140102s2012        paua        ob        001  0  eng  d
■001                                        
■003OCoLC
■00520140127111319
■006m          o    d
■007cr  cnu---unuuu
■019    ▼a786166930
■020    ▼a9781609608521  (electronic  bk.)
■020    ▼a1609608526  (electronic  bk.)
■020    ▼a9781621989288  (electronic  bk.)
■020    ▼a1621989283  (electronic  bk.)
■020    ▼z9781609608514
■020    ▼z1609608518
■020    ▼z9781609608538
■020    ▼z1609608534
■0291  ▼aAU@▼b000048562316
■0291  ▼aNZ1▼b14520979
■0291  ▼aNZ1▼b14522860
■035    ▼a(OCoLC)756496425
■037    ▼aCL0500000133▼bSafari  Books  Online
■040    ▼aN$T▼cN$T▼dYDXCP▼dE7B▼dCDX▼dUPM▼dUMI▼dUIU▼dGGVRL▼dOCLCQ▼dKNOVL
■050  4▼aTK5105.59▼b.C92  2012eb
■072  7▼aCOM▼x060040▼2bisacsh
■072  7▼aCOM▼x043050▼2bisacsh
■072  7▼aCOM▼x053000▼2bisacsh
■08204▼a005.8▼222
■24500▼aCyber  security  standards,  practices  and  industrial  applications▼h[electronic  resource]  ▼bsystems  and  methodologies▼d[edited  by]  Junaid  Ahmed  Zubairi,  Athar  Mahboob
■260    ▼aHershey,  PA▼bInformation  Science  Reference▼cc2012
■300    ▼a1  online  resource  (xviii,  316  p)  ▼bill.
■500    ▼a"Premier  reference  source"--Cover.
■504    ▼aIncludes  bibliographical  references  and  index.
■5050  ▼aSection  1.  Mobile  and  wireless  security  --  section  2.  Social  media,  botnets  and  intrusion  detection  --  section  3.  Formal  methods  and  quantum  computing  --  section  4.  Embedded  systems  and  SCADA  security  --  section  5.  Industrial  and  applications  security.
■520    ▼a"This  book  details  the  latest  and  most  important  advances  in  security  standards,  introducing  the  differences  between  information  security  (covers  the  understanding  of  security  requirements,  classification  of  threats,  attacks  and  information  protection  systems  and  methodologies)  and  network  security  (includes  both  security  protocols  as  well  as  systems  which  create  a  security  perimeter  around  networks  for  intrusion  detection  and  avoidance)"--Provided  by  publisher.
■588    ▼aDescription  based  on  print  version  record.
■650  0▼aComputer  networks▼xSecurity  measures
■650  0▼aComputer  security
■650  0▼aData  protection
■650  0▼aElectronic  data  processing  departments▼xSecurity  measures
■650  7▼aCOMPUTERS  /  Internet  /  Security.▼2bisacsh
■650  7▼aCOMPUTERS  /  Networking  /  Security.▼2bisacsh
■650  7▼aCOMPUTERS  /  Security  /  General.▼2bisacsh
■655  4▼aElectronic  books.
■7001  ▼aZubairi,  Junaid  Ahmed▼d1961-
■7001  ▼aMahboob,  Athar▼d1971-
■77608▼iPrint  version▼tCyber  security  standards,  practices  and  industrial  applications.▼dHershey,  PA  :  Information  Science  Reference,  c2012▼z9781609608514▼w(DLC)    2011009262▼w(OCoLC)705717119
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=389715
■938    ▼aYBP  Library  Services▼bYANK▼n3847105
■938    ▼aebrary▼bEBRY▼nebr10496727
■938    ▼aCoutts  Information  Services▼bCOUT▼n18625359
■938    ▼aCengage  Learning▼bGVRL▼nGVRL6BAZ
■938    ▼aEBSCOhost▼bEBSC▼n389715
■994    ▼a92▼bK4R
■999    ▼z635217623907107158

미리보기

내보내기

chatGPT토론

Ai 추천 관련 도서


    New Books MORE
    Related books MORE
    최근 3년간 통계입니다.

    Buch Status

    • Reservierung
    • 캠퍼스간 도서대출
    • 서가에 없는 책 신고
    • Meine Mappe
    Sammlungen
    Registrierungsnummer callnumber Standort Verkehr Status Verkehr Info
    EW0009456 EB   원문자료 대출가능 대출가능
    마이폴더 부재도서신고

    * Kredite nur für Ihre Daten gebucht werden. Wenn Sie buchen möchten Reservierungen, klicken Sie auf den Button.

    해당 도서를 다른 이용자가 함께 대출한 도서

    Related books

    Related Popular Books

    도서위치