Cyber security standards, practices and industrial applications : systems and methodologies

"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network secu...

Full description

Saved in:
Bibliographic Details
Other Authors: Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-
Format: eBook
Language: English
Published: Hershey, PA : Information Science Reference, ©2012.
Subjects:
ISBN: 9781609608521
1609608526
9781621989288
1621989283
9781609608514
1609608518
9781609608538
1609608534
1283246929
9781283246927
9786613246929
6613246921
Physical Description: 1 online resource (xviii, 316 pages) : illustrations

Cover

Table of contents

LEADER 03386cam a2200529 a 4500
001 kn-ocn756496425
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 111010s2012 paua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d E7B  |d CDX  |d UPM  |d UMI  |d UIU  |d GGVRL  |d OCLCQ  |d KNOVL  |d OCLCF  |d KNOVL  |d OCLCQ  |d EBLCP  |d OCLCQ  |d VT2  |d WY@  |d OCLCA  |d CEF  |d TOF  |d OL$  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d DST  |d IOY  |d OCLCQ  |d OCLCO  |d OCLCL  |d DXU  |d OCLCL 
020 |a 9781609608521  |q (electronic bk.) 
020 |a 1609608526  |q (electronic bk.) 
020 |a 9781621989288  |q (electronic bk.) 
020 |a 1621989283  |q (electronic bk.) 
020 |z 9781609608514 
020 |z 1609608518 
020 |z 9781609608538 
020 |z 1609608534 
020 |a 1283246929 
020 |a 9781283246927 
020 |a 9786613246929 
020 |a 6613246921 
035 |a (OCoLC)756496425  |z (OCoLC)786166930  |z (OCoLC)923155148  |z (OCoLC)959043574  |z (OCoLC)959426994  |z (OCoLC)1005829489  |z (OCoLC)1153022555  |z (OCoLC)1300470235  |z (OCoLC)1303327085 
245 0 0 |a Cyber security standards, practices and industrial applications :  |b systems and methodologies /  |c [edited by] Junaid Ahmed Zubairi, Athar Mahboob. 
260 |a Hershey, PA :  |b Information Science Reference,  |c ©2012. 
300 |a 1 online resource (xviii, 316 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a "Premier reference source"--Cover 
504 |a Includes bibliographical references and index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher 
505 0 |a Section 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Electronic data processing departments  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Zubairi, Junaid Ahmed,  |d 1961-  |1 https://id.oclc.org/worldcat/entity/E39PCjyh7MBQth4TBQmQhFhT73 
700 1 |a Mahboob, Athar,  |d 1971-  |1 https://id.oclc.org/worldcat/entity/E39PCjrgt7h6fkQjd4wHRFthH3 
776 0 8 |i Print version:  |t Cyber security standards, practices and industrial applications.  |d Hershey, PA : Information Science Reference, ©2012  |z 9781609608514  |w (DLC) 2011009262  |w (OCoLC)705717119 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpCSSPIAS1/cyber-security-standards?kpromoter=marc  |y Full text