Securing Information and Communications Systems Principles, Technologies, and Applications

Slamming the door on security threats just got easier for It professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. W...

Full description

Saved in:
Bibliographic Details
Other Authors: Furnell, Steven M. 1970- (Editor), Katsikas, Sokratis (Editor), Lopez, Javier (Editor), Patel, Ahmed (Editor)
Format: Book
Language:English
Published: Boston ARTECH HOUSE 2008
Series:Artech House computer security series
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam#a2200000#i#4501
001 wils-385040
005 2022121152357
008 220221t20082008MAU ag# ##001 |#eng#D
020 # # |a 1596932287  |q hardback 
020 # # |a 9781596932289  |q hardback 
040 # # |a DLC  |b eng  |c DLC  |d UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a QA76.9.A25  |b S43 2008 
245 0 0 |a Securing Information and Communications Systems  |b Principles, Technologies, and Applications  |c Steven M. Furnell, Sokratis Katsikas, Javier Lopez and Ahmed Patel [editors] 
264 # 1 |a Boston  |b ARTECH HOUSE  |c 2008 
264 # 4 |c ©2008 
300 # # |a xiv, 362 pages  |b illustrations  |c 27 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
490 1 # |a ARTECH HOUSE COMPUTER SECURITY SERIES 
504 # # |a Includes bibliographical references and index 
520 # # |a Slamming the door on security threats just got easier for It professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Written by an international team of experts, this one-stop reference maps out the latest user authentication methods, as well as authorization and access controls and their applications in today's database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens. 
650 # 0 |a Data encryption (Computer science) 
650 # 0 |a Computer security 
650 # 0 |a Computer networks  |x Security measures 
700 1 # |a Furnell, Steven M.  |d 1970-  |e editor 
700 1 # |a Katsikas, Sokratis  |e editor 
700 1 # |a Lopez, Javier  |e editor 
700 1 # |a Patel, Ahmed  |e editor 
830 # 0 |a Artech House computer security series 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=385040 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.5.1||00300##b003.5.1||00300##c003.5.1||00520##a007.2||00520##b007.2||