Countering cyber attacks and preserving the integrity and availability of critical systems:
"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagwörter: | |
Links: | https://doi.org/10.4018/978-1-5225-8241-0 https://doi.org/10.4018/978-1-5225-8241-0 https://doi.org/10.4018/978-1-5225-8241-0 https://doi.org/10.4018/978-1-5225-8241-0 https://doi.org/10.4018/978-1-5225-8241-0 https://doi.org/10.4018/978-1-5225-8241-0 https://doi.org/10.4018/978-1-5225-8241-0 |
Zusammenfassung: | "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- |
Umfang: | 1 Online-Ressource |
ISBN: | 9781522582427 |
DOI: | 10.4018/978-1-5225-8241-0 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045441762 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 190205s2019 xx o|||| 00||| eng d | ||
020 | |a 9781522582427 |9 978-1-5225-8242-7 | ||
035 | |a (OCoLC)1085381752 | ||
035 | |a (DE-599)BVBBV045441762 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
245 | 1 | 0 | |a Countering cyber attacks and preserving the integrity and availability of critical systems |c S. Geetha, Asnath Victy Phamila |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer crimes / Prevention | |
650 | 4 | |a Computer security | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Geetha, S. |d 1979- |0 (DE-588)1132255171 |4 edt | |
700 | 1 | |a Phamila, Asnath Victy |d 1978- |0 (DE-588)1129269787 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-8241-0 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-8241-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
912 | |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030827250 | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8241-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2411464 |
---|---|
_version_ | 1821935958158737410 |
any_adam_object | |
author2 | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
author2_role | edt edt |
author2_variant | s g sg a v p av avp |
author_GND | (DE-588)1132255171 (DE-588)1129269787 |
author_facet | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
building | Verbundindex |
bvnumber | BV045441762 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1085381752 (DE-599)BVBBV045441762 |
doi_str_mv | 10.4018/978-1-5225-8241-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02392nam a2200469 c 4500</leader><controlfield tag="001">BV045441762</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190205s2019 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522582427</subfield><subfield code="9">978-1-5225-8242-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085381752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045441762</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Countering cyber attacks and preserving the integrity and availability of critical systems</subfield><subfield code="c">S. Geetha, Asnath Victy Phamila</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geetha, S.</subfield><subfield code="d">1979-</subfield><subfield code="0">(DE-588)1132255171</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phamila, Asnath Victy</subfield><subfield code="d">1978-</subfield><subfield code="0">(DE-588)1129269787</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-8241-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030827250</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045441762 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:27:19Z |
institution | BVB |
isbn | 9781522582427 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030827250 |
oclc_num | 1085381752 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spellingShingle | Countering cyber attacks and preserving the integrity and availability of critical systems Computer networks / Security measures Computer crimes / Prevention Computer security Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast |
title | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_auth | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_exact_search | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_full | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha, Asnath Victy Phamila |
title_fullStr | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha, Asnath Victy Phamila |
title_full_unstemmed | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha, Asnath Victy Phamila |
title_short | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_sort | countering cyber attacks and preserving the integrity and availability of critical systems |
topic | Computer networks / Security measures Computer crimes / Prevention Computer security Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast |
topic_facet | Computer networks / Security measures Computer crimes / Prevention Computer security |
url | https://doi.org/10.4018/978-1-5225-8241-0 |
work_keys_str_mv | AT geethas counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems AT phamilaasnathvicty counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems |