Information security : principles and practice

"Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homew...

Full description

Bibliographic Details
Main Author: Stamp, Mark (Author)
Format: Book
Language:English
Published: Hoboken, NJ : Wiley c2011
Edition:2nd ed
ISBN:9780470626399
0470626399
Item Description:Includes bibliographical references (p. 531-571) and index
Physical Description:xxi, 584 p ill 25 cm
Subjects:
Other Editions:Show all 4 Editions
QR Code: Show QR Code
LEADER 04777cam a2200889 4500
001 637932706
003 DE-627
005 20190120002953.0
007 tu
008 101026s2011 xx ||||| 00| ||eng c
010 |a  2010045221 
020 |a 9780470626399  |c hardback  |9 978-0-470-62639-9 
035 |a (DE-627)637932706 
035 |a (DE-599)GBV637932706 
035 |a (OCoLC)846093739 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XD-US 
050 0 |a QA76.9.A25 
082 0 |a 005.8  |q LOC  |2 22 
082 0 4 |a COM053000  |q bisacsh 
084 |a ST 230  |q BVB  |2 rvk 
084 |a ST 276  |q BVB  |2 rvk 
084 |a ST 277  |q BVB  |2 rvk 
084 |a 54.38  |2 bkl 
084 |a 54.62  |2 bkl 
100 1 |a Stamp, Mark  |e verfasserin  |4 aut 
245 1 0 |a Information security  |b principles and practice  |c Mark Stamp 
250 |a 2nd ed 
264 1 |a Hoboken, NJ  |b Wiley  |c c2011 
300 |a xxi, 584 p  |b ill  |c 25 cm 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Includes bibliographical references (p. 531-571) and index 
520 |a "Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"-- 
520 |a "Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"-- 
689 0 0 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 1 |D s  |0 (DE-588)4128252-8  |0 (DE-627)105718696  |0 (DE-576)209600527  |a Kommunikationsprotokoll  |2 gnd 
689 0 2 |D s  |0 (DE-588)4687059-3  |0 (DE-627)349125775  |0 (DE-576)215035968  |a Malware  |2 gnd 
689 0 |5 (DE-627) 
689 1 0 |D s  |0 (DE-588)4293034-0  |0 (DE-627)104199954  |0 (DE-576)210933003  |a Zugriffskontrolle  |2 gnd 
689 1 1 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 1 2 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 1 |5 (DE-627) 
856 4 2 |u http://www.gbv.de/dms/tib-ub-hannover/637932706.pdf  |m V:DE-601  |m B:DE-89  |q pdf/application  |v 2011-10-28  |x Verlag  |y Inhaltsverzeichnis  |3 Inhaltsverzeichnis 
912 |a GBV_ILN_34 
912 |a SYSFLAG_1 
912 |a GBV_KXP 
912 |a GBV_ILN_70 
912 |a GBV_ILN_105 
936 r v |a ST 230 
936 r v |a ST 276 
936 r v |a ST 277 
936 b k |a 54.38  |j Computersicherheit  |0 (DE-627)106418866 
936 b k |a 54.62  |j Datenstrukturen  |0 (DE-627)106403265 
951 |a BO 
980 |2 34  |1 01  |b 1370059019  |f 18/302  |d Dat 900 90  |e c  |l nel  |x 3551  |y zi002  |z 19-03-13 
980 |2 70  |1 01  |b 1261367669  |d T 11 B 6397  |e u  |x 0089  |y z  |z 19-10-11 
980 |2 105  |1 01  |b 1321694865  |f LB  |d VK:318/2  |e u  |k Insgesamt: 3 ausleihbare Exemplare. - Insgesamt: 1 Präsenzexemplar  |l MAkzacq  |x 0841  |y z  |z 24-08-12 
980 |2 105  |1 02  |b 1339129787  |f LS  |d VK 1690 2012 A 2273  |e f  |x 0841  |y z  |z 14-11-12 
980 |2 105  |1 03  |b 162028104X  |f LB  |d VK:318/2  |e u  |x 0841  |y z  |z 13-06-16 
980 |2 105  |1 04  |b 1620281201  |f LB  |d VK:318/2  |e u  |x 0841  |y z  |z 13-06-16 
983 |2 34  |1 00  |8 00  |a DAT 900 
983 |2 105  |1 00  |8 00  |a VK 1690 
983 |2 105  |1 00  |8 01  |a VK 2370 
984 |2 34  |1 01  |a TW065249 
984 |2 70  |1 01  |a 89$135048877 
984 |2 105  |1 01  |a 841$0001711717  |c Ex.1 
984 |2 105  |1 02  |a 841$0001711725 
984 |2 105  |1 03  |a 841$0002121522  |c Ex.2 
984 |2 105  |1 04  |a 841$0002121530  |c Ex.3 
985 |2 34  |1 01  |a tw13.0655 
985 |2 105  |1 01  |a 2012 A 2272 
985 |2 105  |1 02  |a 2012 A 2273 
985 |2 105  |1 03  |a 2016 A 981 
985 |2 105  |1 04  |a 2016 A 982