Cyber security standards, practices and industrial applications : systems and methodologies
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network secu...
Saved in:
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Hershey, PA :
Information Science Reference,
©2012.
|
Subjects: | |
ISBN: | 9781609608521 1609608526 9781621989288 1621989283 9781609608514 1609608518 9781609608538 1609608534 1283246929 9781283246927 9786613246929 6613246921 |
Physical Description: | 1 online resource (xviii, 316 pages) : illustrations |
LEADER | 03386cam a2200529 a 4500 | ||
---|---|---|---|
001 | kn-ocn756496425 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 111010s2012 paua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d E7B |d CDX |d UPM |d UMI |d UIU |d GGVRL |d OCLCQ |d KNOVL |d OCLCF |d KNOVL |d OCLCQ |d EBLCP |d OCLCQ |d VT2 |d WY@ |d OCLCA |d CEF |d TOF |d OL$ |d OCLCQ |d UKAHL |d OCLCQ |d OCLCO |d DST |d IOY |d OCLCQ |d OCLCO |d OCLCL |d DXU |d OCLCL | ||
020 | |a 9781609608521 |q (electronic bk.) | ||
020 | |a 1609608526 |q (electronic bk.) | ||
020 | |a 9781621989288 |q (electronic bk.) | ||
020 | |a 1621989283 |q (electronic bk.) | ||
020 | |z 9781609608514 | ||
020 | |z 1609608518 | ||
020 | |z 9781609608538 | ||
020 | |z 1609608534 | ||
020 | |a 1283246929 | ||
020 | |a 9781283246927 | ||
020 | |a 9786613246929 | ||
020 | |a 6613246921 | ||
035 | |a (OCoLC)756496425 |z (OCoLC)786166930 |z (OCoLC)923155148 |z (OCoLC)959043574 |z (OCoLC)959426994 |z (OCoLC)1005829489 |z (OCoLC)1153022555 |z (OCoLC)1300470235 |z (OCoLC)1303327085 | ||
245 | 0 | 0 | |a Cyber security standards, practices and industrial applications : |b systems and methodologies / |c [edited by] Junaid Ahmed Zubairi, Athar Mahboob. |
260 | |a Hershey, PA : |b Information Science Reference, |c ©2012. | ||
300 | |a 1 online resource (xviii, 316 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a "Premier reference source"--Cover | ||
504 | |a Includes bibliographical references and index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher | ||
505 | 0 | |a Section 1. Mobile and wireless security -- section 2. Social media, botnets and intrusion detection -- section 3. Formal methods and quantum computing -- section 4. Embedded systems and SCADA security -- section 5. Industrial and applications security. | |
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Electronic data processing departments |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Zubairi, Junaid Ahmed, |d 1961- |1 https://id.oclc.org/worldcat/entity/E39PCjyh7MBQth4TBQmQhFhT73 | |
700 | 1 | |a Mahboob, Athar, |d 1971- |1 https://id.oclc.org/worldcat/entity/E39PCjrgt7h6fkQjd4wHRFthH3 | |
776 | 0 | 8 | |i Print version: |t Cyber security standards, practices and industrial applications. |d Hershey, PA : Information Science Reference, ©2012 |z 9781609608514 |w (DLC) 2011009262 |w (OCoLC)705717119 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpCSSPIAS1/cyber-security-standards?kpromoter=marc |y Full text |