000 | 06666cam a2200853 i 4500 | ||
---|---|---|---|
001 | ocn181345518 | ||
003 | OCoLC | ||
005 | 20240523125529.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 071115t20072007njua ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dIEEEE _dBTCTA _dBAKER _dDG1 _dOCLCQ _dCOO _dDEBSZ _dFTU _dN$T _dYDXCP _dIDEBK _dMERUC _dOCLCF _dE7B _dK6U _dDEBBG _dOCLCQ _dOCLCO _dDG1 _dLIP _dOTZ _dLIV _dOCLCQ _dOCLCO _dINT _dMERER _dOCLCQ _dOCLCO _dOCLCQ _dU3W _dOCLCQ _dLEAUB _dOCLCQ _dOL$ _dOCLCO _dOCLCQ _dOCLCO _dUKSSU _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
019 |
_a159938589 _a176924597 _a647806570 _a744985217 _a990483118 _a995020806 _a1204513994 |
||
020 |
_a9780470099742 _q(electronic bk.) |
||
020 |
_a0470099747 _q(electronic bk.) |
||
020 |
_a9780470099735 _q(electronic bk.) |
||
020 |
_a0470099739 _q(electronic bk.) |
||
020 |
_a9781280900068 _q(ebook) |
||
020 | _a1280900067 | ||
020 |
_z9780471703556 _q(print) |
||
020 |
_z0471703559 _q(print) |
||
024 | 7 |
_a10.1002/0470099747 _2doi |
|
029 | 1 |
_aAU@ _b000051507487 |
|
029 | 1 |
_aAU@ _b000053225676 |
|
029 | 1 |
_aAU@ _b000053281688 |
|
029 | 1 |
_aCHBIS _b010058641 |
|
029 | 1 |
_aCHNEW _b000930176 |
|
029 | 1 |
_aCHVBK _b480105200 |
|
029 | 1 |
_aDEBBG _bBV040885999 |
|
029 | 1 |
_aDEBSZ _b377428078 |
|
029 | 1 |
_aDEBSZ _b400434628 |
|
029 | 1 |
_aNZ1 _b11571118 |
|
035 |
_a(OCoLC)181345518 _z(OCoLC)159938589 _z(OCoLC)176924597 _z(OCoLC)647806570 _z(OCoLC)744985217 _z(OCoLC)990483118 _z(OCoLC)995020806 _z(OCoLC)1204513994 |
||
037 |
_a10.1002/0470099747 _bWiley InterScience _nhttp://www3.interscience.wiley.com |
||
050 | 4 |
_aTK5105.59 _b.D68 2007 |
|
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _222 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aNetwork security : _bcurrent status and future directions / _cedited by Christos Douligeris, Dimitrios N. Serpanos. |
264 | 1 |
_aPiscataway, NJ : _bIEEE Press ; _aHoboken, NJ : _bJohn Wiley & Sons, Inc., _c[2007] |
|
264 | 4 | _c�2007 | |
300 |
_a1 online resource (xvii, 572 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | 0 |
_g1. _tComputer Network Security: Basic Background and Current Issues / _rPanayiotis Kotzanikolaou and Christos Douligeris -- _gPart One. _tInternet Security -- _g2. _tSecure Routing / _rIoannis Avramopoulos, Hisashi Kobayashi, Arvind Krishnamurthy, and Randy Wang -- _g3. _tDesigning Firewalls: A Survey / _rAngelos D. Keromytis and Vassilis Prevelakis -- _g4. _tSecurity in Virtual Private Networks / _rSrinivas Sampalli -- _g5. _tIP Security (IPSec) / _rAnirban Chakrabarti and Manimaran Govindarasu -- _g6. _tIDS for Networks / _rJohn C. McEachen and John M. Zachary -- _g7. _tIntrusion Detection Versus Intrusion Protection / _rLuis Sousa Cardoso -- _g8. _tDenial-of-Service Attacks / _rAikaterini Mitrokotsa and Christos Douligeris -- _g9. _tSecure Architectures with Active Networks / _rSrinivas Sampalli, Yaser Haggag, and Christian Labonte. |
505 | 8 | 0 |
_gPart Two. _tSecure Services -- _g10. _tSecurity in E-Services and Applications / _rManish Mehta, Sachin Singh, and Yugyung Lee -- _g11. _tSecurity in Web Services / _rChristos Douligeris and George P. Ninios -- _g12. _tSecure Multicasting / _rConstantinos Boukouvalas and Anthony G. Petropoulos -- _g13. _tVoice Over IP Security / _rSon Vuong and Kapil Kumar Singh -- _g14. _tGrid Security / _rKyriakos Stefanidis, Artemios G. Voyiatzis, and Dimitrios N. Serpanos -- _g15. _tMobile Agent Security / _rPanayiotis Kotzanikolaou, Christos Douligeris, Rosa Mavropodi, and Vassilios Chrissikopoulos. |
505 | 8 | 0 |
_gPart Three. _tMobile and Security -- _g16. _tMobile Terminal Security / _rOlivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, St�ephane Soci�e, and Claire Whelan -- _g17. _tIEEE 802.11 Security / _rDaniel L. Lough, David J. Robinson, and Ian G. Schneller -- _g18. _tBluetooth Security / _rChristian Gehrmann -- _g19. _tMobile Telecom Networks / _rChristos Xenakis and Lazaros Merakos -- _g20. _tSecurity in Mobile Ad Hoc Networks / _rMike Burmester, Panayiotis Kotznanikolaou, and Christos Douligeris -- _g21. _tWireless Sensor Networks / _rArtemios G. Voyiatzis and Dimitrios N. Serpanos -- _g22. _tTrust / _rLidong Chen. |
505 | 8 | 0 |
_gPart Four. _tTrust, Anonymity, and Privacy -- _g23. _tPKI Systems / _rNikos Komninos -- _g24. _tPrivacy in Electronic Communications / _rAlf Zugenmaier and Joris Claessens -- _g25. Securing Digital Content / _rMagda M. Mourad and Ahmed N. Tantawy -- _gAppendix A. _tCryptography Primer: Introduction to Cryptographic Principles and Algorithms / _rPanayiotis Kotzanikolaou and Christos Douligeris -- _gAppendix B. _tNetwork Security: Overview of Current Legal and Policy Issues / _rAndreas Mitrakas -- _gAppendix C. _tStandards in Network Security / _rDespina Polemi and Panagiotis Sklavos. |
520 | _aThis book covers a wide range of topics dealing with network security. It is focused on the current status of security protocols, architectures, implementations and policies. It makes future projections by analyzing current research activities, proposals, and trends. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures. |
|
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
700 | 1 |
_aDouligeris, C. _q(Christos), _eeditor. _4edt |
|
700 | 1 |
_aSerpanos, Dimitrios Nikolaou, _eeditor _4edt |
|
758 |
_ihas work: _aNetwork security (Text) _1https://id.oclc.org/worldcat/entity/E39PCFtgQPHdmqMVF7dxVYyXtX _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aDouligeris, C. (Christos). _tNetwork security. _dHoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2007 _z9780471703556 _z0471703559 _w(DLC) 2007299406 _w(OCoLC)74967091 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/0470099747 |
938 |
_aBaker & Taylor _bBKTY _c84.95 _d84.95 _i0470099747 _n0007440251 _sactive |
||
938 |
_aBaker and Taylor _bBTCP _nBK0007440251 |
||
938 |
_aebrary _bEBRY _nebr10307385 |
||
938 |
_aEBSCOhost _bEBSC _n197882 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _n90006 |
||
938 |
_aYBP Library Services _bYANK _n2939301 |
||
938 |
_aYBP Library Services _bYANK _n2605853 |
||
994 |
_a92 _bINLUM |
||
999 |
_c11189 _d11189 |