|
|
|
|
LEADER |
04518nam a2200877 4500 |
001 |
ocn748365383 |
003 |
OCoLC |
005 |
20170815040825.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
110830s2011 njua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d CDX
|d E7B
|d EBLCP
|d DG1
|d OCLCQ
|d REDDC
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d UMI
|d DEBBG
|d OCLCQ
|d MHW
|d YDXCP
|d MERUC
|d OCLCF
|d NLGGC
|d OCLCQ
|d COO
|d OCLCQ
|d YDX
|d DG1
|d CPO
|d Z5A
|d LIP
|d GrThAP
|
019 |
|
|
|a 741407736
|a 742515619
|a 751674734
|a 757511553
|a 768595622
|a 875001747
|a 960902074
|a 965393833
|a 984636902
|
020 |
|
|
|a 9781118027950
|q (electronic bk.)
|
020 |
|
|
|a 1118027957
|q (electronic bk.)
|
020 |
|
|
|a 9781118027974
|q (electronic bk.)
|
020 |
|
|
|a 1118027973
|q (electronic bk.)
|
020 |
|
|
|a 9781118027967
|
020 |
|
|
|a 1118027965
|
020 |
|
|
|z 9780470626399
|
020 |
|
|
|z 0470626399
|
024 |
8 |
|
|a 9786613138873
|
029 |
1 |
|
|a AU@
|b 000048838151
|
029 |
1 |
|
|a AU@
|b 000051583861
|
029 |
1 |
|
|a CHNEW
|b 000616259
|
029 |
1 |
|
|a DEBSZ
|b 372822320
|
029 |
1 |
|
|a DEBSZ
|b 397102933
|
029 |
1 |
|
|a DEBSZ
|b 41417495X
|
029 |
1 |
|
|a DEBSZ
|b 425884201
|
029 |
1 |
|
|a DEBSZ
|b 431020523
|
029 |
1 |
|
|a NLGGC
|b 338826815
|
029 |
1 |
|
|a NZ1
|b 13932305
|
029 |
1 |
|
|a DEBBG
|b BV043393496
|
029 |
1 |
|
|a CHVBK
|b 480185301
|
029 |
1 |
|
|a CHNEW
|b 000938223
|
035 |
|
|
|a (OCoLC)748365383
|z (OCoLC)741407736
|z (OCoLC)742515619
|z (OCoLC)751674734
|z (OCoLC)757511553
|z (OCoLC)768595622
|z (OCoLC)875001747
|z (OCoLC)960902074
|z (OCoLC)965393833
|z (OCoLC)984636902
|
037 |
|
|
|a 313887
|b MIL
|
050 |
|
4 |
|a QA76.9.A25
|b S69 2011eb
|
070 |
|
|
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a COM053000
|2 bisacsh
|
084 |
|
|
|a 54.32
|2 bcl
|
049 |
|
|
|a BCCP
|
100 |
1 |
|
|a Stamp, Mark.
|
245 |
1 |
0 |
|a Information security :
|b principles and practice /
|c Mark Stamp.
|
250 |
|
|
|a 2nd ed.
|
264 |
|
1 |
|a Hoboken, N.J. :
|b Wiley,
|c [2011]
|
264 |
|
4 |
|c ©2011
|
300 |
|
|
|a 1 online resource (xxi, 584 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a "Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"--
|c Provided by publisher.
|
504 |
|
|
|a Includes bibliographical references (pages 531-571) and index.
|
505 |
0 |
|
|a Front Matter -- Introduction -- Crypto. Crypto Basics -- Symmetric Key Crypto -- Public Key Crypto -- Hash Functions++ -- Advanced Cryptanalysis -- Access Control. Authentication -- Authorization -- Protocols. Simple Authentication Protocols -- Real-World Security Protocols -- Software. Software Flaws and Malware -- Insecurity in Software -- Operating Systems and Security -- Appendix: A-1 Network Security Basics -- Appendix: A-2 Math Essentials -- Annotated Bibliography -- Index.
|
588 |
0 |
|
|a Print version record.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
1 |
7 |
|a Databescherming.
|2 gtt
|0 (NL-LeOCL)095650350
|
650 |
1 |
7 |
|a Informatiesystemen.
|2 gtt
|0 (NL-LeOCL)078544947
|
650 |
1 |
7 |
|a Computerbeveiliging.
|2 gtt
|0 (NL-LeOCL)091029295
|
650 |
1 |
7 |
|a Internet.
|2 gtt
|0 (NL-LeOCL)101068689
|
650 |
1 |
7 |
|a Computernetwerken.
|2 gtt
|0 (NL-LeOCL)089410513
|
650 |
|
4 |
|a Electronic books.
|
655 |
|
4 |
|a Electronic books.
|
655 |
|
7 |
|a Electronic books.
|2 local
|
655 |
|
0 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Stamp, Mark.
|t Information security.
|b 2nd ed.
|d Hoboken, N.J. : Wiley, ©2011
|z 9780470626399
|w (DLC) 2010045221
|w (OCoLC)671491825
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781118027974
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|