Network security know it all

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network se...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Burlington, MA, USA Morgan Kaufmann © 2008
Schlagworte:
Online-Zugang:DE-860
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV046124738
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 190827s2008 xx o|||| 00||| eng d
020 |a 9780123744630  |9 978-0-12-374463-0 
020 |a 0123744636  |9 0-12-374463-6 
035 |a (ZDB-33-ESD)ocn228301073 
035 |a (OCoLC)228301073 
035 |a (DE-599)BVBBV046124738 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 005.8  |2 22 
245 1 0 |a Network security  |b know it all  |c by James Joshi [and others] 
264 1 |a Burlington, MA, USA  |b Morgan Kaufmann  |c © 2008 
300 |a 1 online resource (1 volume) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension 
650 7 |a Computer networks / Security measures  |2 blmlsh 
650 7 |a Computer networks / Security measures  |2 fast 
650 4 |a Computer networks  |x Security measures 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |8 1\p  |5 DE-604 
700 1 |a Joshi, James B. D.  |e Sonstige  |4 oth 
856 4 0 |u http://www.sciencedirect.com/science/book/9780123744630  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-33-ESD 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-031505192 
966 e |u http://www.sciencedirect.com/science/book/9780123744630  |l DE-860  |p ZDB-33-ESD  |q FLA_PDA_ESD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819307080147795968
any_adam_object
building Verbundindex
bvnumber BV046124738
collection ZDB-33-ESD
ctrlnum (ZDB-33-ESD)ocn228301073
(OCoLC)228301073
(DE-599)BVBBV046124738
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02834nam a2200445zc 4500</leader><controlfield tag="001">BV046124738</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2008 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123744630</subfield><subfield code="9">978-0-12-374463-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123744636</subfield><subfield code="9">0-12-374463-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn228301073</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228301073</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124738</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security</subfield><subfield code="b">know it all</subfield><subfield code="c">by James Joshi [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA, USA</subfield><subfield code="b">Morgan Kaufmann</subfield><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Joshi, James B. D.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123744630</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505192</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780123744630</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV046124738
illustrated Not Illustrated
indexdate 2024-12-24T07:47:15Z
institution BVB
isbn 9780123744630
0123744636
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031505192
oclc_num 228301073
open_access_boolean
physical 1 online resource (1 volume)
psigel ZDB-33-ESD
ZDB-33-ESD FLA_PDA_ESD
publishDate 2008
publishDateSearch 2008
publishDateSort 2008
publisher Morgan Kaufmann
record_format marc
spelling Network security know it all by James Joshi [and others]
Burlington, MA, USA Morgan Kaufmann © 2008
1 online resource (1 volume)
txt rdacontent
c rdamedia
cr rdacarrier
Includes bibliographical references and index
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension
Computer networks / Security measures blmlsh
Computer networks / Security measures fast
Computer networks Security measures
Rechnernetz (DE-588)4070085-9 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Rechnernetz (DE-588)4070085-9 s
Computersicherheit (DE-588)4274324-2 s
1\p DE-604
Joshi, James B. D. Sonstige oth
http://www.sciencedirect.com/science/book/9780123744630 Verlag URL des Erstveröffentlichers Volltext
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Network security know it all
Computer networks / Security measures blmlsh
Computer networks / Security measures fast
Computer networks Security measures
Rechnernetz (DE-588)4070085-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4070085-9
(DE-588)4274324-2
title Network security know it all
title_auth Network security know it all
title_exact_search Network security know it all
title_full Network security know it all by James Joshi [and others]
title_fullStr Network security know it all by James Joshi [and others]
title_full_unstemmed Network security know it all by James Joshi [and others]
title_short Network security
title_sort network security know it all
title_sub know it all
topic Computer networks / Security measures blmlsh
Computer networks / Security measures fast
Computer networks Security measures
Rechnernetz (DE-588)4070085-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Computer networks / Security measures
Computer networks Security measures
Rechnernetz
Computersicherheit
url http://www.sciencedirect.com/science/book/9780123744630
work_keys_str_mv AT joshijamesbd networksecurityknowitall