語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information assurance = dependabilit...
~
ScienceDirect (Online service)
Information assurance = dependability and security in networked systems /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information assurance/ [edited by] Yi Qian ... [et al.].
其他題名:
dependability and security in networked systems /
其他作者:
Qian, Yi,
出版者:
Amsterdam ;Elsevier/Morgan Kaufmann, : c2008.,
面頁冊數:
xxxvii, 537 p. :ill. ; : 25 cm.;
叢書名:
The Morgan Kaufmann series in networking
標題:
Computer security. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.loc.gov/catdir/enhancements/fy0808/2007033726-d.html
ISBN:
9780123735669
Information assurance = dependability and security in networked systems /
Information assurance
dependability and security in networked systems /[electronic resource] :[edited by] Yi Qian ... [et al.]. - Amsterdam ;Elsevier/Morgan Kaufmann,c2008. - xxxvii, 537 p. :ill. ;25 cm. - The Morgan Kaufmann series in networking.
Includes bibliographical references and index.
PART I: SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I: Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems;.
In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2008.
Mode of access: World Wide Web.
ISBN: 9780123735669
Source: 134565:134696Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
557122
Computer security.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.59 / .I5247 2008eb
Dewey Class. No.: 005.8
Information assurance = dependability and security in networked systems /
LDR
:03873nam 2200361Ia 4500
001
618215
003
OCoLC
005
20090612093507.0
006
m d
007
cr cn|||||||||
008
100106s2008 ne a sb 001 0 eng d
020
$a
9780123735669
020
$a
0123735661
029
1
$a
AU@
$b
000043178412
035
$a
(OCoLC)228148418
035
$a
ocn228148418
037
$a
134565:134696
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.59
$b
.I5247 2008eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Information assurance
$h
[electronic resource] :
$b
dependability and security in networked systems /
$c
[edited by] Yi Qian ... [et al.].
260
$a
Amsterdam ;
$a
Boston :
$c
c2008.
$b
Elsevier/Morgan Kaufmann,
300
$a
xxxvii, 537 p. :
$b
ill. ;
$c
25 cm.
440
4
$a
The Morgan Kaufmann series in networking
440
4
$a
The Morgan Kaufmann series in computer security
504
$a
Includes bibliographical references and index.
505
0
$a
PART I: SECURITY TECHNIQUES-- Security Services for Networks and Systems; Prevention and Protection I: Cryptographic Techniques; Prevention and Protection II: Cryptographic Protocols; Prevention and Protection III: Perimeter and System Security; Detection, Response and Assessment; PART II: SURVIVABILITY TECHNIQUES-- Availability and Survivability; Network Survivability; Survivability and Network Management; End System and Application Survivability; PART III: INTERACTION BETWEEN SECURITY AND SURVIVABILITY-- Models and Techniques for Secure and Survivable Systems; Design and Architectural Issues for Secure and Survivable Systems; Security and Survivability of Emerging Systems;.
520
$a
In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2008.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on May 14, 2008).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer networks
$x
Reliability.
$3
655183
650
0
$a
Computer networks
$x
Security measures.
$3
555385
655
7
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Qian, Yi,
$d
1962-
$3
655184
710
2
$a
ScienceDirect (Online service)
$3
636041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9780123735669
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123735669
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0808/2007033726-d.html
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入