Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber security standards, practices ...
~
Zubairi, Junaid Ahmed, (1961-)
Linked to FindBook
Google Book
Amazon
博客來
Cyber security standards, practices and industrial applications = systems and methodologies /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyber security standards, practices and industrial applications/ Junaid Ahmed Zubairi and Athar Mahboob, editors.{me_controlnum}
Reminder of title:
systems and methodologies /
other author:
Zubairi, Junaid Ahmed,
Published:
Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), : 2011.,
Description:
xviii, 316 p. :ill. ;29 cm.
Subject:
Computer networks - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4
ISBN:
9781609608521 (ebook)
Cyber security standards, practices and industrial applications = systems and methodologies /
Cyber security standards, practices and industrial applications
systems and methodologies /[electronic resource] :Junaid Ahmed Zubairi and Athar Mahboob, editors.{me_controlnum} - Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),2011. - xviii, 316 p. :ill. ;29 cm.
Includes bibliographical references.
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781609608521 (ebook)Subjects--Topical Terms:
579161
Computer networks
--Security measures.Subjects--Index Terms:
Botnet phenomena
LC Class. No.: TK5105.59 / .C92 2011e
Dewey Class. No.: 005.8
Cyber security standards, practices and industrial applications = systems and methodologies /
LDR
:02014nmm 2200421 a 4500
001
1032825
003
IGIG
005
20111118134517.0
008
120420s2011 paua fsb 000 0 eng d
010
$z
2011009262
020
$a
9781609608521 (ebook)
020
$a
9781609608514 (hbk.)
020
$a
9781609608538 (print & perpetual access)
035
$a
(CaBNVSL)gtp00548977
035
$a
00000341
040
$a
CaBNVSL
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.C92 2011e
082
0 4
$a
005.8
$2
22
245
0 0
$a
Cyber security standards, practices and industrial applications
$h
[electronic resource] :
$b
systems and methodologies /
$c
Junaid Ahmed Zubairi and Athar Mahboob, editors.{me_controlnum}
260
$a
Hershey, Pa. :
$b
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
$c
2011.
300
$a
xviii, 316 p. :
$b
ill. ;
$c
29 cm.
504
$a
Includes bibliographical references.
520
3
$a
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security.
$3
540555
650
0
$a
Data protection.
$3
590548
650
0
$a
Electronic data processing departments
$x
Security measures.
$3
677850
653
$a
Botnet phenomena
653
$a
C4ISR
653
$a
Cyber attacks
653
$a
Network-based anomaly detection systems
653
$a
Photons
653
$a
Quantum cryptography
653
$a
Remote terminal units (RTUs)
653
$a
Supervisory Control and Data Acquisition (SCADA) system
653
$a
Viruses
653
$a
Worms
653
$a
Trojan horses
653
$a
Web application firewalls
700
1
$a
Zubairi, Junaid Ahmed,
$d
1961-
$3
1361666
700
1
$a
Mahboob, Athar,
$d
1971-
$3
1361667
710
2
$a
IGI Global.
$3
1361470
776
0
$c
(Original)
$w
(DLC)2011009262
776
0 8
$i
Print version:
$z
1609608518
$z
9781609608514
$w
(DLC) 2011009262
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9134034
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .C92 2011e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login