000 | 04925aam a22007811i 4500 | ||
---|---|---|---|
999 |
_c17322 _d17322 |
||
001 | 021332241 | ||
003 | UkOxU | ||
005 | 20200423190139.0 | ||
006 | m || d | | ||
007 | cr ||||||||||| | ||
008 | 170503s2017 sz a ob 001 0 eng d | ||
015 |
_aGBB8J9956 _2bnb |
||
020 |
_a9783319556062 _q(electronic bk.) |
||
020 |
_a3319556061 _q(electronic bk.) |
||
020 |
_z9783319556055 _q(print) |
||
020 | _z3319556053 | ||
024 | 7 |
_a10.1007/978-3-319-55606-2 _2doi |
|
035 | _a(Uk)019099679 | ||
037 |
_acom.springer.onix.9783319556062 _bSpringer Nature |
||
040 |
_aGW5XE _beng _erda _epn _cGW5XE _dYDX _dAZU _dUPM _dOCLCF _dCOO _dUAB _dESU _dIOG _dMERER _dOCLCQ _dVT2 _dU3W _dCAUOI _dKSU _dAU@ _dUk |
||
042 | _aukblsr | ||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aUNH _2bicssc |
|
072 | 7 |
_aUND _2bicssc |
|
072 | 7 |
_aCOM030000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 | 0 |
_aKizza, Joseph Migga, _eauthor. _938006 |
245 | 1 | 0 |
_aGuide to computer network security / _cJoseph Migga Kizza. |
250 | _aFourth edition. | ||
264 | 1 |
_aCham, Switzerland : _bSpringer, _c2017. |
|
300 |
_a1 online resource (xxiv, 569 pages) : _billustrations. |
||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aComputer communications and networks, _x1617-7975 |
|
500 | _aAcademic | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aPart I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem -- The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects. | |
506 | 1 |
_aLegal Deposit; _cOnly available on premises controlled by the deposit library and to one user at any one time; _eThe Legal Deposit Libraries (Non-Print Works) Regulations (UK). _5UkOxU |
|
540 |
_aRestricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. _5UkOxU |
||
546 | _aEnglish | ||
588 | 0 | _aOnline resource; title from PDF title page (SpringerLink, viewed May 3, 2017). | |
650 | 0 |
_aComputer science. _938007 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _938008 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 _938008 |
|
650 | 1 | 4 |
_aComputer Science. _938009 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _938010 |
650 | 2 | 4 |
_aData Storage Representation. _938011 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _938012 |
650 | 2 | 4 |
_aComputer Communication Networks. _938013 |
650 | 7 |
_aComputers _xSystem Administration _xStorage & Retrieval. _2bisacsh _938014 |
|
650 | 7 |
_aBusiness & Economics _xInformation Management. _2bisacsh _938015 |
|
650 | 7 |
_aComputers _xHardware _xNetwork Hardware. _2bisacsh _938016 |
|
650 | 7 |
_aData mining. _2bicssc _938017 |
|
650 | 7 |
_aInformation architecture. _2bicssc _938018 |
|
650 | 7 |
_aNetwork hardware. _2bicssc _938019 |
|
650 | 0 |
_aInformation storage and retrieva. _938020 |
|
650 | 0 |
_aInformation Systems. _938021 |
|
650 | 0 |
_aComputer Communication Networks. _938013 |
|
650 | 7 |
_aInformation retrieval. _2bicssc _938022 |
|
655 | 4 |
_aElectronic books. _938023 |
|
830 | 0 |
_aComputer communications and networks. _x1617-7975 _938024 |
|
856 |
_uhttp://online.fliphtml5.com/lluzx/agdm/ _zЦахимаар унших |
||
884 |
_aLDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl _g20181024 _kcom.springer.onix.9783319556062 _qUk |
||
942 |
_2ddc _cEB |