Securing Information and Communications Systems Principles, Technologies, and Applications
Slamming the door on security threats just got easier for It professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. W...
Saved in:
Other Authors: | , , , |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston
ARTECH HOUSE
2008
|
Series: | Artech House computer security series
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000cam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-385040 | ||
005 | 2022121152357 | ||
008 | 220221t20082008MAU ag# ##001 |#eng#D | ||
020 | # | # | |a 1596932287 |q hardback |
020 | # | # | |a 9781596932289 |q hardback |
040 | # | # | |a DLC |b eng |c DLC |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a QA76.9.A25 |b S43 2008 |
245 | 0 | 0 | |a Securing Information and Communications Systems |b Principles, Technologies, and Applications |c Steven M. Furnell, Sokratis Katsikas, Javier Lopez and Ahmed Patel [editors] |
264 | # | 1 | |a Boston |b ARTECH HOUSE |c 2008 |
264 | # | 4 | |c ©2008 |
300 | # | # | |a xiv, 362 pages |b illustrations |c 27 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
490 | 1 | # | |a ARTECH HOUSE COMPUTER SECURITY SERIES |
504 | # | # | |a Includes bibliographical references and index |
520 | # | # | |a Slamming the door on security threats just got easier for It professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Written by an international team of experts, this one-stop reference maps out the latest user authentication methods, as well as authorization and access controls and their applications in today's database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens. |
650 | # | 0 | |a Data encryption (Computer science) |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Computer networks |x Security measures |
700 | 1 | # | |a Furnell, Steven M. |d 1970- |e editor |
700 | 1 | # | |a Katsikas, Sokratis |e editor |
700 | 1 | # | |a Lopez, Javier |e editor |
700 | 1 | # | |a Patel, Ahmed |e editor |
830 | # | 0 | |a Artech House computer security series |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=385040 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.5.1||00300##b003.5.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |