Skip to content
TUM Library
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporarily saved: 0 temporarily saved (Full)
  • Help
    • Contact
    • Search Tips
    • Interlibary loan info
  • Chat
  • Tools
    • Search History
    • Open Interlibary Loan
    • Recommend a Purchase
  • Deutsch
  • Account

    Account

    • Borrowed Items
    • Requested Items
    • Fees
    • Profile
    • Search History
  • Log Out
  • Login
  • Books & Journals
  • Papers
Advanced
  • Applied information security
  • Cite this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
    • Export to BibTeX
    • Export to RIS
  • Add to favorites
  • Save temporarily Remove from Book Bag
  • Permalink
Export Ready — 
Cover Image
Saved in:
Bibliographic Details
Main Authors: Basin, David (Author), Schaller, Patrick (Author), Schläpfer, Michael (Author)
Format: Book
Language:English
Published: Berlin [u.a.] Springer 2011
Subjects:
Computersicherheit
Rechnernetz
Virtuelle Maschine
Logdatei
Betriebssystem
Anwendungssystem
Zugriffskontrolle
Kryptoanalyse
Softwareschwachstelle
Public-Key-Kryptosystem
Risikoanalyse
Links:http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024588806&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Physical Description:XIV, 202 S. graph. Darst.
ISBN:9783642244735
3642244734
Staff View

MARC

LEADER 00000nam a2200000 c 4500
001 BV039741135
003 DE-604
005 20120208
007 t|
008 111205s2011 xx d||| |||| 00||| eng d
015 |a 11,N38  |2 dnb 
015 |a 11,A49  |2 dnb 
016 7 |a 1015274935  |2 DE-101 
020 |a 9783642244735  |c Pp. : EUR 32.05 (DE) (freier Pr.), ca. EUR 33.00 (AT) (freier Pr.), ca. sfr 40.00 (freier Pr.)  |9 978-3-642-24473-5 
020 |a 3642244734  |9 3-642-24473-4 
024 3 |a 9783642244735 
028 5 2 |a Best.-Nr.: 80114099 
035 |a (OCoLC)844948411 
035 |a (DE-599)DNB1015274935 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-706  |a DE-634  |a DE-11  |a DE-29T  |a DE-526 
082 0 |a 005.8  |2 22/ger 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a 004  |2 sdnb 
100 1 |a Basin, David  |e Verfasser  |4 aut 
245 1 0 |a Applied information security  |b a hands-on approach  |c David Basin ; Patrick Schaller ; Michael Schläpfer 
264 1 |a Berlin [u.a.]  |b Springer  |c 2011 
300 |a XIV, 202 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Virtuelle Maschine  |0 (DE-588)4188396-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Logdatei  |0 (DE-588)4381064-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Betriebssystem  |0 (DE-588)4006216-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Anwendungssystem  |0 (DE-588)4139375-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Public-Key-Kryptosystem  |0 (DE-588)4209133-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Risikoanalyse  |0 (DE-588)4137042-9  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |D s 
689 0 2 |a Virtuelle Maschine  |0 (DE-588)4188396-2  |D s 
689 0 3 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 4 |a Betriebssystem  |0 (DE-588)4006216-8  |D s 
689 0 5 |a Anwendungssystem  |0 (DE-588)4139375-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 1 1 |a Logdatei  |0 (DE-588)4381064-0  |D s 
689 1 2 |a Public-Key-Kryptosystem  |0 (DE-588)4209133-0  |D s 
689 1 3 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 4 |a Risikoanalyse  |0 (DE-588)4137042-9  |D s 
689 1 |5 DE-604 
700 1 |a Schaller, Patrick  |e Verfasser  |4 aut 
700 1 |a Schläpfer, Michael  |e Verfasser  |4 aut 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |t Applied Information Security 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024588806&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-024588806 

Record in the Search Index

_version_ 1819263736303583232
adam_text IMAGE 1 CONTENTS SECURITY PRINCIPLES 1 1.1 OBJECTIVES 1 1.2 PROBLEM CONTEXT 1 1.3 THE PRINCIPLES 2 1.3.1 SIMPLICITY 3 1.3.2 OPEN DESIGN 3 1.3.3 COMPARTMENTALIZATION 4 1.3.4 MINIMUM EXPOSURE 5 1.3.5 LEAST PRIVILEGE 6 1.3.6 MINIMUM TRUST AND MAXIMUM TRUSTWORTHINESS 7 1.3.7 SECURE, FAIL-SAFE DEFAULTS 9 1.3.8 COMPLETE MEDIATION 10 1.3.9 NO SINGLE POINT OF FAILURE 11 1.3.10 TRACEABILITY 12 1.3.11 GENERATING SECRETS 13 1.3.12 USABILITY 13 1.4 DISCUSSION 14 1.5 ASSIGNMENT 14 1.6 EXERCISES 14 THE VIRTUAL ENVIRONMENT 17 2.1 OBJECTIVES 17 2.2 VIRTUALBOX 18 2.2.1 SETTING UP A NEW VIRTUAL MACHINE 18 2.2.2 THE NETWORK 19 2.3 THE LAB ENVIRONMENT 21 2.3.1 THE HOSTS 22 2.4 INSTALLING THE VIRTUAL MACHINES 24 2.4.1 INSTALLING HOST A L I CE 24 2.4.2 INSTALLING HOST BOB 25 2.4.3 INSTALLINGHOSTMALLET 26 XI BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1015274935 DIGITALISIERT DURCH IMAGE 2 CONTENTS NETWORK SERVICES 27 3.1 OBJECTIVES 27 3.2 NETWORKING BACKGROUND 28 3.2.1 INTERNET LAYER 29 3.2.2 TRANSPORT LAYER 29 3.3 THE ADVERSARY S POINT OF VIEW 31 3.3.1 INFORMATION GATHERING 31 3.3.2 FINDING POTENTIAL VULNERABILITIES 33 3.3.3 EXPLOITING VULNERABILITIES 35 3.3.4 VULNERABLE CONFIGURATIONS 36 3.4 THE ADMINISTRATOR S POINT OF VIEW 38 3.5 ACTIONS TO BE TAKEN 39 3.5.1 DEACTIVATING SERVICES 39 3.5.2 RESTRICTING SERVICES 42 3.6 EXERCISES 45 AUTHENTICATION AND ACCESS CONTROL 47 4. 1 OBJECTIVES 47 4.2 AUTHENTICATION 47 4.2.1 TELNET AND REMOTE SHELL 48 4.2.2 SECURE SHELL 49 4.3 USER IDS AND PERMISSIONS 52 4.3.1 FILE ACCESS PERMISSIONS 52 4.3.2 SETUID AND SETGID 55 4.4 SHELL SCRIPT SECURITY 57 4.4.1 SYMBOLIC LINKS 58 4.4.2 TEMPORARY FILES 59 4.4.3 ENVIRONMENT 60 4.4.4 DATA VALIDATION 61 4.5 QUOTAS 62 4.6 CHANGE ROOT 63 4.7 EXERCISES 66 LOGGING AND LOG ANALYSIS 69 5.1 OBJECTIVES 69 5.2 LOGGING MECHANISMS AND LOG FILES 70 5.2.1 REMOTE LOGGING 72 5.3 PROBLEMS WITH LOGGING 72 5.3.1 TAMPERING AND AUTHENTICITY 72 5.3.2 TAMPER-PROOF LOGGING 73 5.3.3 INPUT VALIDATION 73 5.3.4 ROTATION 74 5.4 INTRUSION DETECTION 74 5.4.1 LOG ANALYSIS 75 5.4.2 SUSPICIOUS FILES AND ROOTKITS 76 IMAGE 3 CONTENTS 5.4.3 INTEGRITY CHECKS 77 5.5 EXERCISES 79 WEB APPLICATION SECURITY 81 6.1 OBJECTIVES 81 6.2 PREPARATORY WORK 82 6.3 BLACK-BOX AUDIT 82 6.4 ATTACKING WEB APPLICATIONS 84 6.4.1 REMOTE FILE UPLOAD VULNERABILITY IN JOOMLA! 84 6.4.2 REMOTE COMMAND EXECUTION 85 6.4.3 SQL INJECTIONS 86 6.4.4 PRIVILEGE ESCALATION 88 6.5 USER AUTHENTICATION AND SESSION MANAGEMENT 89 6.5.1 A PHP-BASED AUTHENTICATION MECHANISM 89 6.5.2 HTTP BASIC AUTHENTICATION 90 6.5.3 COOKIE-BASED SESSION MANAGEMENT 92 6.6 CROSS-SITE SCRIPTING (XSS) 94 6.6.1 PERSISTENT XSS ATTACKS 94 6.6.2 REFLECTED XSS ATTACKS 95 6.6.3 DOM-BASED XSS ATTACKS 96 6.7 SQL INJECTIONS REVISITED 97 6.8 SECURE SOCKET LAYER 98 6.9 FURTHER READING 100 6.10 EXERCISES 100 CERTIFICATES AND PUBLIC KEY CRYPTOGRAPHY 103 7.1 OBJECTIVES 103 7.2 FUNDAMENTALS OF PUBLIC KEY CRYPTOGRAPHY 103 7.3 DISTRIBUTION OF PUBLIC KEYS AND CERTIFICATES 105 7.4 CREATING KEYS AND CERTIFICATES 107 7.5 RUNNING A CERTIFICATE AUTHORITY 108 7.6 CERTIFICATE-BASED CLIENT AUTHENTICATION I LL 7.7 EXERCISES 112 RISK MANAGEMENT 117 8.1 OBJECTIVES 117 8.2 RISK AND RISK MANAGEMENT 117 8.3 THE CORE ELEMENTS OF RISK ANALYSIS 120 8.4 RISK ANALYSIS: AN IMPLEMENTATION 129 8.4.1 SYSTEM DESCRIPTION 130 8.4.2 STAKEHOLDERS 132 8.4.3 ASSETS AND VULNERABILITIES 132 8.4.4 VULNERABILITIES 137 8.4.5 THREAT SOURCES 138 8.4.6 RISKS AND COUNTERMEASURES 139 IMAGE 4 XIV CONTENTS 8.4.7 SUMMARY 144 A USING THIS BOOK IN A LAB COURSE 147 A. 1 COURSE STRUCTURE 147 A.2 PROJECT 148 B REPORT TEMPLATE 155 B.I SYSTEM CHARACTERIZATION 155 B. 1.1 SYSTEM OVERVIEW 155 B.1.2 SYSTEM FUNCTIONALITY 155 B.I.3 COMPONENTS AND SUBSYSTEMS 156 B.1.4 INTERFACES 156 B.1.5 BACKDOORS 156 B.1.6 ADDITIONAL MATERIAL 156 B.2 RISK ANALYSIS AND SECURITY MEASURES 156 B.2.1 INFORMATION ASSETS 156 B.2.2 THREAT SOURCES 156 B.2.3 RISKS AND COUNTERMEASURES 157 B.3 REVIEW OF THE EXTERNAL SYSTEM 158 B.3.1 BACKGROUND 158 B.3.2 COMPLETENESS IN TERMS OF FUNCTIONALITY 158 B.3.3 ARCHITECTURE AND SECURITY CONCEPTS 158 B.3.4 IMPLEMENTATION 158 B.3.5 BACKDOORS 159 B.3.6 COMPARISON 159 C LINUX BASICS AND TOOLS 161 C.I SYSTEM DOCUMENTATION 161 C.2 TOOLS 163 C.2.1 VARIABLES 163 C.2.2 QUOTING AND WILDCARDS 164 C.2.3 PIPELINING AND BACKQUOTES 164 C.2.4 I S, F I ND AND L O C A TE 165 C.2.5 WE, S O R T, U N I Q, H E AD AND T A IL 165 C.2.6 P S, P G R E P, K I LL AND K I L L A LL 165 C.2.7 G R EP 166 C.2.8 AWK AND S ED 167 C.2.9 TCPDUMP 168 D ANSWERS TO QUESTIONS 169 REFERENCES 197 INDEX 199
any_adam_object 1
author Basin, David
Schaller, Patrick
Schläpfer, Michael
author_facet Basin, David
Schaller, Patrick
Schläpfer, Michael
author_role aut
aut
aut
author_sort Basin, David
author_variant d b db
p s ps
m s ms
building Verbundindex
bvnumber BV039741135
classification_rvk ST 277
ctrlnum (OCoLC)844948411
(DE-599)DNB1015274935
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03122nam a2200709 c 4500</leader><controlfield tag="001">BV039741135</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120208 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">111205s2011 xx d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,A49</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1015274935</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642244735</subfield><subfield code="c">Pp. : EUR 32.05 (DE) (freier Pr.), ca. EUR 33.00 (AT) (freier Pr.), ca. sfr 40.00 (freier Pr.)</subfield><subfield code="9">978-3-642-24473-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642244734</subfield><subfield code="9">3-642-24473-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642244735</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80114099</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)844948411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1015274935</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-526</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Basin, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied information security</subfield><subfield code="b">a hands-on approach</subfield><subfield code="c">David Basin ; Patrick Schaller ; Michael Schläpfer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 202 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Virtuelle Maschine</subfield><subfield code="0">(DE-588)4188396-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Logdatei</subfield><subfield code="0">(DE-588)4381064-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Virtuelle Maschine</subfield><subfield code="0">(DE-588)4188396-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Logdatei</subfield><subfield code="0">(DE-588)4381064-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schaller, Patrick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schläpfer, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Applied Information Security</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=024588806&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024588806</subfield></datafield></record></collection>
id DE-604.BV039741135
illustrated Illustrated
indexdate 2024-12-20T16:01:16Z
institution BVB
isbn 9783642244735
3642244734
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024588806
oclc_num 844948411
open_access_boolean
owner DE-706
DE-634
DE-11
DE-29T
DE-526
owner_facet DE-706
DE-634
DE-11
DE-29T
DE-526
physical XIV, 202 S. graph. Darst.
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Springer
record_format marc
spellingShingle Basin, David
Schaller, Patrick
Schläpfer, Michael
Applied information security a hands-on approach
Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Virtuelle Maschine (DE-588)4188396-2 gnd
Logdatei (DE-588)4381064-0 gnd
Betriebssystem (DE-588)4006216-8 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Softwareschwachstelle (DE-588)4752508-3 gnd
Public-Key-Kryptosystem (DE-588)4209133-0 gnd
Risikoanalyse (DE-588)4137042-9 gnd
subject_GND (DE-588)4274324-2
(DE-588)4070085-9
(DE-588)4188396-2
(DE-588)4381064-0
(DE-588)4006216-8
(DE-588)4139375-2
(DE-588)4293034-0
(DE-588)4830502-9
(DE-588)4752508-3
(DE-588)4209133-0
(DE-588)4137042-9
title Applied information security a hands-on approach
title_auth Applied information security a hands-on approach
title_exact_search Applied information security a hands-on approach
title_full Applied information security a hands-on approach David Basin ; Patrick Schaller ; Michael Schläpfer
title_fullStr Applied information security a hands-on approach David Basin ; Patrick Schaller ; Michael Schläpfer
title_full_unstemmed Applied information security a hands-on approach David Basin ; Patrick Schaller ; Michael Schläpfer
title_short Applied information security
title_sort applied information security a hands on approach
title_sub a hands-on approach
topic Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Virtuelle Maschine (DE-588)4188396-2 gnd
Logdatei (DE-588)4381064-0 gnd
Betriebssystem (DE-588)4006216-8 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Softwareschwachstelle (DE-588)4752508-3 gnd
Public-Key-Kryptosystem (DE-588)4209133-0 gnd
Risikoanalyse (DE-588)4137042-9 gnd
topic_facet Computersicherheit
Rechnernetz
Virtuelle Maschine
Logdatei
Betriebssystem
Anwendungssystem
Zugriffskontrolle
Kryptoanalyse
Softwareschwachstelle
Public-Key-Kryptosystem
Risikoanalyse
url http://deposit.dnb.de/cgi-bin/dokserv?id=3882006&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024588806&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT basindavid appliedinformationsecurityahandsonapproach
AT schallerpatrick appliedinformationsecurityahandsonapproach
AT schlapfermichael appliedinformationsecurityahandsonapproach
  • Availability

‌

Order via interlibrary loan
Table of Contents
  • Legal Notice
  • Data Privacy
  • Accessibility Statement
  • First Level Hotline