|
|
|
|
LEADER |
04006nam a2200613 a 4500 |
001 |
19354 |
003 |
IGIG |
005 |
20110809144204.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
110808s2011 paua fsb 000 0 eng d |
010 |
# |
# |
|z 2011009262
|
020 |
# |
# |
|a 9781609608521 (ebook)
|
020 |
# |
# |
|z 9781609608514 (hbk.)
|
020 |
# |
# |
|z 9781609608538 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-60960-851-4
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00548977
|
035 |
# |
# |
|a (OCoLC)751699581
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK5105.59
|b .C92 2011e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a Cyber security standards, practices and industrial applications
|b systems and methodologies /
|c Junaid Ahmed Zubairi and Athar Mahboob, editors.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c 2011.
|
300 |
# |
# |
|a electronic texts (279 p.) :
|b ill., digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. Securing wireless ad hoc networks: state of the art and challenges / Victor Pomponiu -- 2. Smartphone data protection using mobile usage pattern matching / Wen-Chen Hu ... [et al.] -- 3. Conservation of mobile data and usability constraints / Rania Mokhtar and Rashid Saeed -- 4. Cyber security and privacy in the age of social networks / Babar Bhatti -- 5. Botnets and cyber security: battling online threats / Ahmed Mansour Manasrah ... [et al.] -- 6. Evaluation of contemporary anomaly detection systems (ADSs) / Ayesha Binte Ashfaq and Syed Ali Khayam -- 7. Practical quantum key distribution / Sellami Ali -- 8. Automated formal methods for security protocol engineering / Alfredo Pironti, Davide Pozza and Riccardo Sisto -- 9. Fault tolerant remote terminal units (RTUs) in SCADA systems / Syed Misbahuddin and Nizar Al-Holou -- 10. Embedded systems security / Muhammad Farooq-i-Azam and Muhammad Naeem Ayyaz -- 11. Cyber security in liquid petroleum pipelines / Morgan Henrie -- 12. Application of cyber security in emerging C4ISR systems / Ashfaq Ahmad Malik ... [et al.] -- 13. Practical Web application security audit following industry standards and compliance / Shakeel Ali.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed August 8, 2011).
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Electronic data processing departments
|x Security measures.
|
653 |
# |
# |
|a Botnet phenomena
|
653 |
# |
# |
|a C4ISR
|
653 |
# |
# |
|a Cyber attacks
|
653 |
# |
# |
|a Network-based anomaly detection systems
|
653 |
# |
# |
|a Photons
|
653 |
# |
# |
|a Quantum cryptography
|
653 |
# |
# |
|a Remote terminal units (RTUs)
|
653 |
# |
# |
|a Supervisory Control and Data Acquisition (SCADA) system
|
653 |
# |
# |
|a Viruses
|
653 |
# |
# |
|a Worms
|
653 |
# |
# |
|a Trojan horses
|
653 |
# |
# |
|a Web application firewalls
|
700 |
1 |
# |
|a Zubairi, Junaid Ahmed,
|d 1961-
|
700 |
1 |
# |
|a Mahboob, Athar,
|d 1971-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2011009262
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2011009262
|z 9781609608514
|z 1609608518
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4
|3 Chapter PDFs via platform:
|