자료유형 | E-Book |
---|---|
개인저자 | Zubairi, Junaid Ahmed, 1961- Mahboob, Athar, 1971- |
서명/저자사항 | Cyber security standards, practices and industrial applications[electronic resource] :systems and methodologies /[edited by] Junaid Ahmed Zubairi, Athar Mahboob. |
발행사항 | Hershey, PA : Information Science Reference, c2012. |
형태사항 | 1 online resource (xviii, 316 p.) : ill. |
ISBN | 9781609608521 (electronic bk.) 1609608526 (electronic bk.) 9781621989288 (electronic bk.) 1621989283 (electronic bk.) |
일반주기 |
"Premier reference source"--Cover.
|
서지주기 | Includes bibliographical references and index. |
내용주기 | Section 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security. |
요약 | "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher. |
일반주제명 | Computer networks -- Security measures. Computer security. Data protection. Electronic data processing departments -- Security measures. COMPUTERS / Internet / Security. COMPUTERS / Networking / Security. COMPUTERS / Security / General. |
언어 | 영어 |
기타형태 저록 | Print version:Cyber security standards, practices and industrial applications.Hershey, PA : Information Science Reference, c20129781609608514 |
대출바로가기 | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=389715 |
인쇄
No. | 등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 예약 | 서비스 | 매체정보 |
---|---|---|---|---|---|---|---|---|
1 | WE00001862 | 005.8 | 가야대학교/전자책서버(컴퓨터서버)/ | 대출가능 |