Modelling Cyber Security : (Record no. 72873)

000 -LEADER
fixed length control field 04771nam a22005053i 4500
001 - CONTROL NUMBER
control field EBC501456
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20181121154015.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181113s2009 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781607505174
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781607500742
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC501456
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL501456
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10375700
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL260096
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)591162494
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.D314 -- M64 2009eb
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Gori, U.
245 10 - TITLE STATEMENT
Title Modelling Cyber Security :
Remainder of title Approaches, Methodology, Strategies.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam :
Name of publisher, distributor, etc IOS Press,
Date of publication, distribution, etc 2009.
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2009.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (240 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement NATO Science for Peace and Security Series E: Human and Societal Dynamics, v. 59 ;
Volume number/sequential designation v.v. 59
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Title page -- Introduction -- Contents -- Approaching Security -- Conceptual Approaches to Security -- Thoughts on the Open Information Society: Does the Concept of ``Privacy of an Organisation'' Exist? -- Striking the Balance: Security vs. Utility -- Secure Software Engineering: Developing the New Generation of Secure Systems by Introducing a Security Focus Throughout the Development Lifecycle -- Current Methods Applied to Security -- A Fuzzy Approach to Security Codes: Cryptography Between Technological Evolution and Human Perception -- Cryptography and Security: Evolutionary Information Theory and Prime Numbers Genetics -- A Note on Public-Key Cryptosystems and Their Underlying Mathematical Problems -- Intrusion in a Mission Critical Network: A Tutorial on Intrusion Detection Systems and Intrusion Prevention Systems -- A World-Wide Financial Infrastructure to Confront Cyber Terrorism -- A Pragmatic and Foolproof Approach for Connecting Critical/Industrial Networks to External Less Secure Networks -- A Cyber Security Approach for Smart Meters at ERDF -- Understanding Terrorism and Its Interaction with Critical Infrastructures -- Facing Terrorist Attacks and Attacks to Critical Infrastructures -- Al-Qaeda: Its Global Marketing Strategy -- A New Paradigm for Countering Jihadism -- Modelling Deterrence in Cyberia -- The Cutting Edge of Cyber Network Development - A Paradigm to Translate and Predict the Network Strategies of Avant-Garde Cyber Criminals -- Protecting Critical Infrastructures from Cyber Attacks Involving Malware -- Police and Military Force Operations and Approaches -- Protecting Critical Information Infrastructures: Domestic Experience and Competencies of the Postal and Communication Service of the Italian National Police -- Fighting Terrorism in Cyberspace -- Cyberspace Control: How to Avert a Cyber World War.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note European Measures and Legal Aspects -- The Role of Europe in Matching Today's Asymmetric Threats -- Information Sharing in the Context of European Union Critical Information Infrastructure Protection -- Defining Critical Information Infrastructure in the Context of Cyber Threats: The Privacy Perspective -- Crimen Ex Machina: A Legal Approach -- Curricula Vitae of the Authors -- List of Participants. NATO ARW - Operational Network Intelligence: Today and Tomorrow -- Subject Index -- Author Index.
520 ## - SUMMARY, ETC.
Summary, etc Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security -- Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography -- Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science) -- Congresses.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name NATO Advanced Research Workshop on Operational Network Intelligence Today and Tomorrow,.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name IOS Press,.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Gori, U.
Title Modelling Cyber Security : Approaches, Methodology, Strategies
Place, publisher, and date of publication Amsterdam : IOS Press,c2009
International Standard Book Number 9781607500742
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title NATO Science for Peace and Security Series E: Human and Societal Dynamics, v. 59
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=501456">https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=501456</a>
Public note Click to View

No items available.

Powered by Koha