語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security standards, practices ...
~
IGI Global.
Cyber security standards, practices and industrial applications = systems and methodologies /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber security standards, practices and industrial applications/ Junaid Ahmed Zubairi and Athar Mahboob, editors.
其他題名:
systems and methodologies /
其他作者:
Zubairi, Junaid Ahmed,
出版者:
Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), : 2011.,
面頁冊數:
xviii, 316 p. :ill. ; : 29 cm.;
標題:
Computer networks - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4
ISBN:
9781609608521 (ebook)
Cyber security standards, practices and industrial applications = systems and methodologies /
Cyber security standards, practices and industrial applications
systems and methodologies /[electronic resource] :Junaid Ahmed Zubairi and Athar Mahboob, editors. - Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),2011. - xviii, 316 p. :ill. ;29 cm.
Includes bibliographical references.
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781609608521 (ebook)Subjects--Topical Terms:
555385
Computer networks
--Security measures.Subjects--Index Terms:
Botnet phenomena
LC Class. No.: TK5105.59 / .C92 2011e
Dewey Class. No.: 005.8
Cyber security standards, practices and industrial applications = systems and methodologies /
LDR
:01878nam a2200397 a 4500
001
687630
003
IGIG
005
19991118134517.0
008
111221s2011 paua fsb 000 0 eng d
010
$z
2011009262
020
$a
9781609608521 (ebook)
020
$a
9781609608514 (hbk.)
020
$a
9781609608538 (print & perpetual access)
035
$a
(CaBNVSL)gtp00548977
035
$a
00000341
040
$a
CaBNVSL
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.C92 2011e
082
0 4
$a
005.8
$2
22
245
0 0
$a
Cyber security standards, practices and industrial applications
$h
[electronic resource] :
$b
systems and methodologies /
$c
Junaid Ahmed Zubairi and Athar Mahboob, editors.
260
$a
Hershey, Pa. :
$b
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
$c
2011.
300
$a
xviii, 316 p. :
$b
ill. ;
$c
29 cm.
504
$a
Includes bibliographical references.
520
3
$a
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
0
$a
Data protection.
$3
557764
650
0
$a
Electronic data processing departments
$x
Security measures.
$3
596341
653
$a
Botnet phenomena
653
$a
C4ISR
653
$a
Cyber attacks
653
$a
Network-based anomaly detection systems
653
$a
Photons
653
$a
Quantum cryptography
653
$a
Remote terminal units (RTUs)
653
$a
Supervisory Control and Data Acquisition (SCADA) system
653
$a
Viruses
653
$a
Worms
653
$a
Trojan horses
653
$a
Web application firewalls
700
1
$a
Zubairi, Junaid Ahmed,
$d
1961-
$3
805404
700
1
$a
Mahboob, Athar,
$d
1971-
$3
805405
710
2
$a
IGI Global.
$3
805187
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入