Countering cyber attacks and preserving the integrity and availability of critical systems
"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-573 DE-20 DE-1049 DE-898 DE-706 DE-1050 DE-83 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046096307 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190809s2019 xx o|||| 00||| eng d | ||
020 | |a 9781522582427 |9 978-1-5225-8242-7 | ||
024 | 7 | |a 10.4018/978-1-5225-8241-0 |2 doi | |
035 | |a (ZDB-1-IGE)00216517 | ||
035 | |a (OCoLC)1085381752 | ||
035 | |a (DE-599)BVBBV046096307 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-20 |a DE-1049 |a DE-898 |a DE-706 |a DE-1050 |a DE-83 | ||
082 | 0 | |a 005.8/2 |2 23 | |
245 | 1 | 0 | |a Countering cyber attacks and preserving the integrity and availability of critical systems |c S. Geetha and Asnath Victy Phamila, editors |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource (30 PDFs (xxix, 334 pages)) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on title screen (IGI Global, viewed 01/31/2019) | ||
520 | |a "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer crimes / Prevention | |
650 | 4 | |a Computer security | |
700 | 1 | |a Geetha, S. |d 1979- |4 edt | |
700 | 1 | |a Phamila, Asnath Victy |d 1978- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 152258241X |z 9781522582410 |
856 | 4 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltex | |
912 | |a ZDB-1-IGE | ||
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031477162 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2424978 |
---|---|
_version_ | 1820865006042873856 |
any_adam_object | |
author2 | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
author2_role | edt edt |
author2_variant | s g sg a v p av avp |
author_facet | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
building | Verbundindex |
bvnumber | BV046096307 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00216517 (OCoLC)1085381752 (DE-599)BVBBV046096307 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03000nam a2200505zc 4500</leader><controlfield tag="001">BV046096307</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190809s2019 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522582427</subfield><subfield code="9">978-1-5225-8242-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8241-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00216517</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085381752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046096307</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Countering cyber attacks and preserving the integrity and availability of critical systems</subfield><subfield code="c">S. Geetha and Asnath Victy Phamila, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (30 PDFs (xxix, 334 pages))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/31/2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geetha, S.</subfield><subfield code="d">1979-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phamila, Asnath Victy</subfield><subfield code="d">1978-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">152258241X</subfield><subfield code="z">9781522582410</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltex</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031477162</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046096307 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T07:46:31Z |
institution | BVB |
isbn | 9781522582427 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031477162 |
oclc_num | 1085381752 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
physical | 1 Online-Ressource (30 PDFs (xxix, 334 pages)) |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spellingShingle | Countering cyber attacks and preserving the integrity and availability of critical systems Computer networks / Security measures Computer crimes / Prevention Computer security |
title | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_auth | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_exact_search | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_full | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors |
title_fullStr | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors |
title_full_unstemmed | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors |
title_short | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_sort | countering cyber attacks and preserving the integrity and availability of critical systems |
topic | Computer networks / Security measures Computer crimes / Prevention Computer security |
topic_facet | Computer networks / Security measures Computer crimes / Prevention Computer security |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |
work_keys_str_mv | AT geethas counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems AT phamilaasnathvicty counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems |