MARC보기
LDR03329cmm uu200673Ka 4500
001000000300942
003OCoLC
00520230519142023
006m o d
007cr cnu---unuuu
008111010s2012 paua ob 001 0 eng d
019 ▼a 786166930
020 ▼a 9781609608521 (electronic bk.)
020 ▼a 1609608526 (electronic bk.)
020 ▼a 9781621989288 (electronic bk.)
020 ▼a 1621989283 (electronic bk.)
020 ▼z 9781609608514
020 ▼z 1609608518
020 ▼z 9781609608538
020 ▼z 1609608534
0291 ▼a AU@ ▼b 000048562316
0291 ▼a NZ1 ▼b 14520979
0291 ▼a NZ1 ▼b 14522860
035 ▼a (OCoLC)756496425
037 ▼a CL0500000133 ▼b Safari Books Online
040 ▼a N$T ▼c N$T ▼d YDXCP ▼d E7B ▼d CDX ▼d UPM ▼d UMI ▼d UIU ▼d GGVRL ▼d OCLCQ ▼d KNOVL ▼d 248032
049 ▼a K4RA
050 4 ▼a TK5105.59 ▼b .C92 2012eb
072 7 ▼a COM ▼x 060040 ▼2 bisacsh
072 7 ▼a COM ▼x 043050 ▼2 bisacsh
072 7 ▼a COM ▼x 053000 ▼2 bisacsh
08204 ▼a 005.8 ▼2 22
24500 ▼a Cyber security standards, practices and industrial applications ▼h [electronic resource] : ▼b systems and methodologies / ▼c [edited by] Junaid Ahmed Zubairi, Athar Mahboob.
260 ▼a Hershey, PA : ▼b Information Science Reference, ▼c c2012.
300 ▼a 1 online resource (xviii, 316 p.) : ▼b ill.
500 ▼a "Premier reference source"--Cover.
504 ▼a Includes bibliographical references and index.
5050 ▼a Section 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security.
520 ▼a "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
588 ▼a Description based on print version record.
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Computer security.
650 0 ▼a Data protection.
650 0 ▼a Electronic data processing departments ▼x Security measures.
650 7 ▼a COMPUTERS / Internet / Security. ▼2 bisacsh
650 7 ▼a COMPUTERS / Networking / Security. ▼2 bisacsh
650 7 ▼a COMPUTERS / Security / General. ▼2 bisacsh
655 4 ▼a Electronic books.
7001 ▼a Zubairi, Junaid Ahmed, ▼d 1961-
7001 ▼a Mahboob, Athar, ▼d 1971-
77608 ▼i Print version: ▼t Cyber security standards, practices and industrial applications. ▼d Hershey, PA : Information Science Reference, c2012 ▼z 9781609608514 ▼w (DLC) 2011009262 ▼w (OCoLC)705717119
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=389715
938 ▼a YBP Library Services ▼b YANK ▼n 3847105
938 ▼a ebrary ▼b EBRY ▼n ebr10496727
938 ▼a Coutts Information Services ▼b COUT ▼n 18625359
938 ▼a Cengage Learning ▼b GVRL ▼n GVRL6BAZ
938 ▼a EBSCOhost ▼b EBSC ▼n 389715
990 ▼a 관리자
994 ▼a 92 ▼b K4R