Countering cyber attacks and preserving the integrity and availability of critical systems

"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Geetha, S. 1979- (HerausgeberIn), Phamila, Asnath Victy 1978- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey, Pennsylvania IGI Global [2019]
Schlagworte:
Online-Zugang:DE-91
DE-573
DE-20
DE-1049
DE-898
DE-706
DE-1050
DE-83
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV046096307
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 190809s2019 xx o|||| 00||| eng d
020 |a 9781522582427  |9 978-1-5225-8242-7 
024 7 |a 10.4018/978-1-5225-8241-0  |2 doi 
035 |a (ZDB-1-IGE)00216517 
035 |a (OCoLC)1085381752 
035 |a (DE-599)BVBBV046096307 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91  |a DE-573  |a DE-20  |a DE-1049  |a DE-898  |a DE-706  |a DE-1050  |a DE-83 
082 0 |a 005.8/2  |2 23 
245 1 0 |a Countering cyber attacks and preserving the integrity and availability of critical systems  |c S. Geetha and Asnath Victy Phamila, editors 
264 1 |a Hershey, Pennsylvania  |b IGI Global  |c [2019] 
300 |a 1 Online-Ressource (30 PDFs (xxix, 334 pages)) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Description based on title screen (IGI Global, viewed 01/31/2019) 
520 |a "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- 
650 4 |a Computer networks / Security measures 
650 4 |a Computer crimes / Prevention 
650 4 |a Computer security 
700 1 |a Geetha, S.  |d 1979-  |4 edt 
700 1 |a Phamila, Asnath Victy  |d 1978-  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 152258241X  |z 9781522582410 
856 4 |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltex 
912 |a ZDB-1-IGE 
912 |a ZDB-98-IGB 
943 1 |a oai:aleph.bib-bvb.de:BVB01-031477162 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-91  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-573  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-20  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-1049  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-898  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-706  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-1050  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2424978
_version_ 1820865006042873856
any_adam_object
author2 Geetha, S. 1979-
Phamila, Asnath Victy 1978-
author2_role edt
edt
author2_variant s g sg
a v p av avp
author_facet Geetha, S. 1979-
Phamila, Asnath Victy 1978-
building Verbundindex
bvnumber BV046096307
collection ZDB-1-IGE
ZDB-98-IGB
ctrlnum (ZDB-1-IGE)00216517
(OCoLC)1085381752
(DE-599)BVBBV046096307
dewey-full 005.8/2
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8/2
dewey-search 005.8/2
dewey-sort 15.8 12
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03000nam a2200505zc 4500</leader><controlfield tag="001">BV046096307</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190809s2019 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522582427</subfield><subfield code="9">978-1-5225-8242-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8241-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00216517</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085381752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046096307</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Countering cyber attacks and preserving the integrity and availability of critical systems</subfield><subfield code="c">S. Geetha and Asnath Victy Phamila, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (30 PDFs (xxix, 334 pages))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/31/2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geetha, S.</subfield><subfield code="d">1979-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phamila, Asnath Victy</subfield><subfield code="d">1978-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">152258241X</subfield><subfield code="z">9781522582410</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltex</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031477162</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV046096307
illustrated Not Illustrated
indexdate 2024-12-24T07:46:31Z
institution BVB
isbn 9781522582427
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031477162
oclc_num 1085381752
open_access_boolean
owner DE-91
DE-BY-TUM
DE-573
DE-20
DE-1049
DE-898
DE-BY-UBR
DE-706
DE-1050
DE-83
owner_facet DE-91
DE-BY-TUM
DE-573
DE-20
DE-1049
DE-898
DE-BY-UBR
DE-706
DE-1050
DE-83
physical 1 Online-Ressource (30 PDFs (xxix, 334 pages))
psigel ZDB-1-IGE
ZDB-98-IGB
ZDB-98-IGB TUB_EBS_IGB
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher IGI Global
record_format marc
spellingShingle Countering cyber attacks and preserving the integrity and availability of critical systems
Computer networks / Security measures
Computer crimes / Prevention
Computer security
title Countering cyber attacks and preserving the integrity and availability of critical systems
title_auth Countering cyber attacks and preserving the integrity and availability of critical systems
title_exact_search Countering cyber attacks and preserving the integrity and availability of critical systems
title_full Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors
title_fullStr Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors
title_full_unstemmed Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors
title_short Countering cyber attacks and preserving the integrity and availability of critical systems
title_sort countering cyber attacks and preserving the integrity and availability of critical systems
topic Computer networks / Security measures
Computer crimes / Prevention
Computer security
topic_facet Computer networks / Security measures
Computer crimes / Prevention
Computer security
url http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0
work_keys_str_mv AT geethas counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems
AT phamilaasnathvicty counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems