MARC details
000 -LEADER |
fixed length control field |
04695nam a22004695i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-642-04117-4 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170628035115.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100715s2010 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642041174 |
-- |
978-3-642-04117-4 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-3-642-04117-4 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK1-9971 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
TJK |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
TEC041000 |
Source |
bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
621.382 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stavroulakis, Peter. |
Relator term |
editor. |
245 10 - TITLE STATEMENT |
Title |
Handbook of Information and Communication Security |
Medium |
[electronic resource] / |
Statement of responsibility, etc |
edited by Peter Stavroulakis, Mark Stamp. |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg, |
-- |
2010. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XVI, 867 p. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Fundamentals and Cryptography -- A Framework for System Security -- Public-Key Cryptography -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based Information Security -- Bio-Cryptography -- Quantum Cryptography -- Intrusion Detection and Access Control -- Intrusion Detection and Prevention Systems -- Intrusion Detection Systems -- Intranet Security via Firewalls -- Distributed Port Scan Detection -- Host-Based Anomaly Intrusion Detection -- Security in Relational Databases -- Anti-bot Strategies Based on Human Interactive Proofs -- Access and Usage Control in Grid Systems -- ECG-Based Authentication -- Networking -- Peer-to-Peer Botnets -- Security of Service Networks -- Network Traffic Analysis and SCADA Security -- Mobile Ad Hoc Network Routing -- Security for Ad Hoc Networks -- Phishing Attacks and Countermeasures -- Optical Networking -- Chaos-Based Secure Optical Communications Using Semiconductor Lasers -- Chaos Applications in Optical Communications -- Wireless Networking -- Security in Wireless Sensor Networks -- Secure Routing in Wireless Sensor Networks -- Security via Surveillance and Monitoring -- Security and Quality of Service in Wireless Networks -- Software -- Low-Level Software Security by Example -- Software Reverse Engineering -- Trusted Computing -- Security via Trusted Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues -- Fundamentals of Digital Forensic Evidence -- Multimedia Forensics for Detecting Forgeries -- Technological and Legal Aspects of CIS. |
520 ## - SUMMARY, ETC. |
Summary, etc |
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Telecommunication. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Engineering. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data Structures, Cryptology and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Systems and Data Security. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stamp, Mark. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642041167 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a> |
912 ## - |
-- |
ZDB-2-ENG |