Handbook of Information and Communication Security (Record no. 111578)

000 -LEADER
fixed length control field 04087nam a22004695i 4500
001 - CONTROL NUMBER
control field 978-3-642-04117-4
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220084526.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100715s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642041174
-- 978-3-642-04117-4
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-04117-4
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK1-9971
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJK
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC041000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.382
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stavroulakis, Peter.
Relator term editor.
245 10 - TITLE STATEMENT
Title Handbook of Information and Communication Security
Medium [electronic resource] /
Statement of responsibility, etc edited by Peter Stavroulakis, Mark Stamp.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
300 ## - PHYSICAL DESCRIPTION
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Fundamentals and Cryptography -- A Framework for System Security -- Public-Key Cryptography -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based Information Security -- Bio-Cryptography -- Quantum Cryptography -- Intrusion Detection and Access Control -- Intrusion Detection and Prevention Systems -- Intrusion Detection Systems -- Intranet Security via Firewalls -- Distributed Port Scan Detection -- Host-Based Anomaly Intrusion Detection -- Security in Relational Databases -- Anti-bot Strategies Based on Human Interactive Proofs -- Access and Usage Control in Grid Systems -- ECG-Based Authentication -- Networking -- Peer-to-Peer Botnets -- Security of Service Networks -- Network Traffic Analysis and SCADA Security -- Mobile Ad Hoc Network Routing -- Security for Ad Hoc Networks -- Phishing Attacks and Countermeasures -- Optical Networking -- Chaos-Based Secure Optical Communications Using Semiconductor Lasers -- Chaos Applications in Optical Communications -- Wireless Networking -- Security in Wireless Sensor Networks -- Secure Routing in Wireless Sensor Networks -- Security via Surveillance and Monitoring -- Security and Quality of Service in Wireless Networks -- Software -- Low-Level Software Security by Example -- Software Reverse Engineering -- Trusted Computing -- Security via Trusted Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues -- Fundamentals of Digital Forensic Evidence -- Multimedia Forensics for Detecting Forgeries -- Technological and Legal Aspects of CIS.
520 ## - SUMMARY, ETC.
Summary, etc The Handbook of Information and Communication Security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors’ intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. This handbook will be useful to researchers and graduate students in academia, as well as being an invaluable resource for university instructors who are searching for new material to cover in their security courses. In addition, the topics in this volume are highly relevant to the real world practice of information security, which should make this book a valuable resource for working IT professionals. This handbook will be a valuable resource for a diverse audience for many years to come.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Structures, Cryptology and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems and Data Security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Stamp, Mark.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642041167
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-04117-4
912 ## -
-- ZDB-2-ENG

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue