LDR | | 03329cmm uu200673Ka 4500 |
001 | | 000000300942 |
003 | | OCoLC |
005 | | 20230519142023 |
006 | | m o d |
007 | | cr cnu---unuuu |
008 | | 111010s2012 paua ob 001 0 eng d |
019 | |
▼a 786166930 |
020 | |
▼a 9781609608521 (electronic bk.) |
020 | |
▼a 1609608526 (electronic bk.) |
020 | |
▼a 9781621989288 (electronic bk.) |
020 | |
▼a 1621989283 (electronic bk.) |
020 | |
▼z 9781609608514 |
020 | |
▼z 1609608518 |
020 | |
▼z 9781609608538 |
020 | |
▼z 1609608534 |
029 | 1 |
▼a AU@
▼b 000048562316 |
029 | 1 |
▼a NZ1
▼b 14520979 |
029 | 1 |
▼a NZ1
▼b 14522860 |
035 | |
▼a (OCoLC)756496425 |
037 | |
▼a CL0500000133
▼b Safari Books Online |
040 | |
▼a N$T
▼c N$T
▼d YDXCP
▼d E7B
▼d CDX
▼d UPM
▼d UMI
▼d UIU
▼d GGVRL
▼d OCLCQ
▼d KNOVL
▼d 248032 |
049 | |
▼a K4RA |
050 | 4 |
▼a TK5105.59
▼b .C92 2012eb |
072 | 7 |
▼a COM
▼x 060040
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 043050
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 053000
▼2 bisacsh |
082 | 04 |
▼a 005.8
▼2 22 |
245 | 00 |
▼a Cyber security standards, practices and industrial applications
▼h [electronic resource] :
▼b systems and methodologies /
▼c [edited by] Junaid Ahmed Zubairi, Athar Mahboob. |
260 | |
▼a Hershey, PA :
▼b Information Science Reference,
▼c c2012. |
300 | |
▼a 1 online resource (xviii, 316 p.) :
▼b ill. |
500 | |
▼a "Premier reference source"--Cover. |
504 | |
▼a Includes bibliographical references and index. |
505 | 0 |
▼a Section 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security. |
520 | |
▼a "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher. |
588 | |
▼a Description based on print version record. |
650 | 0 |
▼a Computer networks
▼x Security measures. |
650 | 0 |
▼a Computer security. |
650 | 0 |
▼a Data protection. |
650 | 0 |
▼a Electronic data processing departments
▼x Security measures. |
650 | 7 |
▼a COMPUTERS / Internet / Security.
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Networking / Security.
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Security / General.
▼2 bisacsh |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a Zubairi, Junaid Ahmed,
▼d 1961- |
700 | 1 |
▼a Mahboob, Athar,
▼d 1971- |
776 | 08 |
▼i Print version:
▼t Cyber security standards, practices and industrial applications.
▼d Hershey, PA : Information Science Reference, c2012
▼z 9781609608514
▼w (DLC) 2011009262
▼w (OCoLC)705717119 |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=389715 |
938 | |
▼a YBP Library Services
▼b YANK
▼n 3847105 |
938 | |
▼a ebrary
▼b EBRY
▼n ebr10496727 |
938 | |
▼a Coutts Information Services
▼b COUT
▼n 18625359 |
938 | |
▼a Cengage Learning
▼b GVRL
▼n GVRL6BAZ |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 389715 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b K4R |