Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Wiley-Scrivener
2020
|
Ausgabe: | 1st edition. |
Links: | https://learning.oreilly.com/library/view/-/9781119555643/?ar |
Zusammenfassung: | The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. |
Beschreibung: | Online resource; Title from title page (viewed March 17, 2020) |
Umfang: | 1 online resource (368 pages) |
ISBN: | 9781119555643 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-058893148 | ||
003 | DE-627-1 | ||
005 | 20240228121416.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201021s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781119555643 |9 978-1-119-55564-3 | ||
035 | |a (DE-627-1)058893148 | ||
035 | |a (DE-599)KEP058893148 | ||
035 | |a (ORHE)9781119555643 | ||
035 | |a (DE-627-1)058893148 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230216 | |
100 | 1 | |a Goyal, Dinesh |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Design and Analysis of Security Protocol for Communication |c Goyal, Dinesh |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Wiley-Scrivener |c 2020 | |
300 | |a 1 online resource (368 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title page (viewed March 17, 2020) | ||
520 | |a The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. | ||
700 | 1 | |a Balamurugan, S. |e VerfasserIn |4 aut | |
700 | 1 | |a Peng, Sheng-Lung |e VerfasserIn |4 aut | |
700 | 1 | |a Verma, O. |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119555643/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-058893148 |
---|---|
_version_ | 1833357044931887105 |
adam_text | |
any_adam_object | |
author | Goyal, Dinesh Balamurugan, S. Peng, Sheng-Lung Verma, O. |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Goyal, Dinesh Balamurugan, S. Peng, Sheng-Lung Verma, O. Safari, an O'Reilly Media Company |
author_role | aut aut aut aut |
author_sort | Goyal, Dinesh |
author_variant | d g dg s b sb s l p slp o v ov |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)058893148 (DE-599)KEP058893148 (ORHE)9781119555643 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01845cam a22003972c 4500</leader><controlfield tag="001">ZDB-30-ORH-058893148</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121416.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201021s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119555643</subfield><subfield code="9">978-1-119-55564-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058893148</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP058893148</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119555643</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058893148</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Goyal, Dinesh</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Design and Analysis of Security Protocol for Communication</subfield><subfield code="c">Goyal, Dinesh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Wiley-Scrivener</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (368 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed March 17, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balamurugan, S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peng, Sheng-Lung</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verma, O.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119555643/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-058893148 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:45:26Z |
institution | BVB |
isbn | 9781119555643 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (368 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Wiley-Scrivener |
record_format | marc |
spelling | Goyal, Dinesh VerfasserIn aut Design and Analysis of Security Protocol for Communication Goyal, Dinesh 1st edition. [Erscheinungsort nicht ermittelbar] Wiley-Scrivener 2020 1 online resource (368 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title page (viewed March 17, 2020) The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. Balamurugan, S. VerfasserIn aut Peng, Sheng-Lung VerfasserIn aut Verma, O. VerfasserIn aut Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Goyal, Dinesh Balamurugan, S. Peng, Sheng-Lung Verma, O. Design and Analysis of Security Protocol for Communication |
title | Design and Analysis of Security Protocol for Communication |
title_auth | Design and Analysis of Security Protocol for Communication |
title_exact_search | Design and Analysis of Security Protocol for Communication |
title_full | Design and Analysis of Security Protocol for Communication Goyal, Dinesh |
title_fullStr | Design and Analysis of Security Protocol for Communication Goyal, Dinesh |
title_full_unstemmed | Design and Analysis of Security Protocol for Communication Goyal, Dinesh |
title_short | Design and Analysis of Security Protocol for Communication |
title_sort | design and analysis of security protocol for communication |
work_keys_str_mv | AT goyaldinesh designandanalysisofsecurityprotocolforcommunication AT balamurugans designandanalysisofsecurityprotocolforcommunication AT pengshenglung designandanalysisofsecurityprotocolforcommunication AT vermao designandanalysisofsecurityprotocolforcommunication AT safarianoreillymediacompany designandanalysisofsecurityprotocolforcommunication |