Information security : principles and practice

"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While n...

Full description

Bibliographic Details
Main Author: Stamp, Mark (Author)
Format: eBook
Language:English
Published: Hoboken, NJ : Wiley-Interscience 2005
ISBN:9780471744191
0471744190
0471738484
9780471738480
1280241446
9781280241444
0471744182
9780471744184
Item Description:Description based upon print version of record
Physical Description:Online-Ressource (Text + Images)
DOI:10.1002/0471744190
Subjects:
QR Code: Show QR Code
LEADER 09829cam a22013692 4500
001 559762682
003 DE-627
005 20200119035928.0
007 cr uuu---uuuuu
008 080312s2005 xx |||||o 00| ||eng c
020 |a 9780471744191  |9 978-0-471-74419-1 
020 |a 0471738484  |c cloth  |9 0-471-73848-4 
020 |a 1280241446  |9 1-280-24144-6 
020 |a 9780471738480  |c : cloth  |9 978-0-471-73848-0 
020 |a 9781280241444  |9 978-1-280-24144-4 
024 7 |a 10.1002/0471744190  |2 doi 
035 |a (DE-627)559762682 
035 |a (DE-599)GBV559762682 
035 |a (OCoLC)836913721 
035 |a (EBC)EBC240929 
035 |a (EbpS)142859 
040 |a DE-627  |b eng  |c DE-627  |e pn 
041 |a eng 
044 |c XD-US 
050 0 |a QA76.9.A25 
082 0 |a 005.8 
084 |a ST 230  |2 rvk 
084 |a ST 277  |2 rvk 
084 |a COM 060040  |2 BISAC 
084 |a COM 043050  |2 BISAC 
084 |a UT  |2 BIC 
084 |a COM 053000  |2 BISAC 
084 |a 54.38  |2 bkl 
084 |a 54.62  |2 bkl 
100 1 |a Stamp, Mark  |e verfasserin  |4 aut 
245 1 0 |a Information security  |b principles and practice  |c Mark Stamp 
264 1 |a Hoboken, NJ  |b Wiley-Interscience  |c 2005 
300 |a Online-Ressource (Text + Images) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Description based upon print version of record 
501 |a CONTENTS; Preface; About The Author; Acknowledgments; 1 INTRODUCTION; 2 CRYPTO BASICS; 3 SYMMETRIC KEY CRYPTO; 4 PUBLIC KEY CRYPTO; 5 HASH FUNCTIONS AND OTHER TOPICS; 6 ADVANCED CRYPTANALYSIS; 7 AUTHENTICATION; 8 AUTHORIZATION; 9 SIMPLE AUTHENTICATION PROTOCOLS; 10 REAL-WORLD SECURITY PROTOCOLS; 11 SOFTWARE FLAWS AND MALWARE; 12 INSECURITY IN SOFTWARE; 13 OPERATING SYSTEMS AND SECURITY; APPENDIX; ANNOTATED BIBLIOGRAPHY; INDEX; 
520 |a "As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--Jacket 
520 |a Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:* Cryptography: classic cryptosystem 
530 |a Electronic reproduction 
533 |a Online-Ausg.  |d 2010  |7 |2010||||||||||  |n Electronic reproduction 
689 0 0 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 1 |D s  |0 (DE-588)4293034-0  |0 (DE-627)104199954  |0 (DE-576)210933003  |a Zugriffskontrolle  |2 gnd 
689 0 2 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 3 |D s  |0 (DE-588)4128252-8  |0 (DE-627)105718696  |0 (DE-576)209600527  |a Kommunikationsprotokoll  |2 gnd 
689 0 4 |D s  |0 (DE-588)4687059-3  |0 (DE-627)349125775  |0 (DE-576)215035968  |a Malware  |2 gnd 
689 0 |5 (DE-627) 
776 1 |z 0471744182  |c electronic bk.  |9 0-471-74418-2 
776 1 |z 0471744190  |c electronic bk.  |9 0-471-74419-0 
776 1 |z 9780471744184  |c : electronic bk.  |9 978-0-471-74418-4 
776 1 |z 9780471744191  |c : electronic bk.  |9 978-0-471-74419-1 
776 1 |z 9780471738480  |9 978-0-471-73848-0 
776 0 8 |i Print version  |a Information Security  |d Principles and Practice 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142859  |x Verlag  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1002/0471744190  |x Resolving-System  |y John Wiley  |3 Volltext 
856 4 0 |u http://gbv.eblib.com/patron/FullRecord.aspx?p=240929  |x Verlag  |3 Volltext 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142859  |x Verlag  |3 Volltext 
856 4 0 |u https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=240929  |x Aggregator  |3 Volltext 
856 4 0 |u http://onlinelibrary.wiley.com/book/10.1002/0471744190  |x Verlag  |3 Volltext 
856 4 2 |u http://catdir.loc.gov/catdir/toc/ecip058/2005005152.html  |x Verlag  |3 Inhaltsverzeichnis 
856 4 2 |u http://external.dandelon.com/download/attachments/dandelon/ids/DE00498C23CC2EFEA9EEDC12570D1003D5FCF.pdf  |m V:DE-601  |m X:AGI  |q pdf/application  |v 2018-06-01  |x Verlag  |3 Inhaltsverzeichnis 
856 4 2 |u https://external.dandelon.com/download/attachments/dandelon/ids/DE00498C23CC2EFEA9EEDC12570D1003D5FCF.pdf  |m V:DE-601  |m X:AGI  |q pdf/application  |v 2018-06-29  |x Verlag  |3 Inhaltsverzeichnis 
912 |a H-ZDB-4-NLEBK 
912 |a H-ZDB-30-PQE 
912 |a H-ZDB-35-WIC 
912 |a H-ZDB-35-UBC 
912 |a GBV_ILN_21 
912 |a SYSFLAG_1 
912 |a GBV_KXP 
912 |a GBV_ILN_23 
912 |a GBV_ILN_90 
912 |a GBV_ILN_100 
912 |a GBV_ILN_120 
912 |a GBV_ILN_206 
912 |a GBV_ILN_252 
935 |h GBV  |i hybr 
936 r v |a ST 230 
936 r v |a ST 277 
936 b k |a 54.38  |j Computersicherheit  |0 (DE-627)106418866 
936 b k |a 54.62  |j Datenstrukturen  |0 (DE-627)106403265 
951 |a BO 
980 |2 21  |1 01  |b 1614101779  |h ebook_2016_wiley_ubcm  |k Freie Nutzung im Campusnetz der Universitaet und der Hochschulen im Lande Bremen  |x 0046  |y zza  |z 03-05-16 
980 |2 23  |1 01  |b 1728561256  |h olr-wiley1  |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots  |x 0830  |y z  |z 07-12-17 
980 |2 90  |1 01  |b 1833827201  |h OLR-ubcm  |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt.  |x 3090  |y z  |z 19-12-18 
980 |2 100  |1 01  |b 863831338  |d eBook Wiley  |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots.  |l Bestellung (Wiley-Paket) unter epn 851382754  |x 3100  |y z  |z 12-03-08 
980 |2 120  |1 01  |b 1683751426  |k Campusweiter Zugriff (Universität Oldenburg). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots.  |x 0715  |y z  |z 02-05-17 
980 |2 120  |1 02  |b 3582089088  |e g  |h alma  |x 0715  |y z  |z 24-01-20 
980 |2 120  |1 03  |b 1754058949  |e g  |h alma  |x 0715  |y z  |z 22-02-18 
980 |2 206  |1 01  |b 1547503238  |d Online-Ressource  |e g  |h OLR-EBL  |k Please send a request, if the ebook is not available!  |l E-Books (Schweitzer)  |x 3350  |y zh  |z 20-06-15 
980 |2 252  |1 01  |b 1423728629  |f Thünen-Institut  |d Online-Ressource  |e g  |h OLR-EBL  |k Ebook noch nicht erworben! Nach dem Kauf: Vervielfältigungen (z. B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte.  |l E-Books (Schweitzer)  |x 4252  |y zi070e  |z 08-08-13 
981 |2 21  |1 01  |r https://onlinelibrary.wiley.com/doi/book/10.1002/0471744190 
981 |2 23  |1 01  |y E-books (Wiley)  |r http://dx.doi.org/10.1002/0471744190 
981 |2 90  |1 01  |r http://dx.doi.org/10.1002/0471744190 
981 |2 100  |1 01  |y E-books (Wiley)  |r http://dx.doi.org/10.1002/0471744190 
981 |2 100  |1 01  |y für Uniangehörige: Zugang weltweit  |r http://han.med.uni-magdeburg.de/han/WileyInterScienceeBookseinzeln/dx.doi.org/10.1002/0471744190 
981 |2 120  |1 01  |r http://dx.doi.org/10.1002/0471744190 
981 |2 120  |1 02  |r http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991014932621203501 
981 |2 120  |1 03  |r http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991014326529703501 
981 |2 206  |1 01  |y Fulltext  |r https://thh-friedensau.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/thhfriedensau/detail.action?docID=240929 
981 |2 252  |1 01  |y Zeitlich begrenzter Lesezugriffzugriff nur für Angehörige des Thünen-Instituts  |r http://thinst.eblib.com/patron/FullRecord.aspx?p=240929 
983 |2 120  |1 00  |8 99  |a ww 
983 |2 120  |1 03  |8 00  |a ww 
985 |2 23  |1 01  |a 2017-02100, 2017-02101, 2017-02102, 2017-02103, 2017-02104 
995 |2 21  |1 01  |a ebook_2016_wiley_ubcm 
995 |2 23  |1 01  |a olr-wiley1 
995 |2 90  |1 01  |a OLR-ubcm 
995 |2 120  |1 02  |a alma 
995 |2 120  |1 03  |a alma 
995 |2 206  |1 01  |a OLR-EBL 
995 |2 252  |1 01  |a OLR-EBL 
998 |2 23  |1 01  |0 2017.12.07