| 000 | 02360nam a22003378i 4500 | ||
|---|---|---|---|
| 001 | CR9780511536700 | ||
| 003 | UkCbUP | ||
| 005 | 20200124160257.0 | ||
| 006 | m|||||o||d|||||||| | ||
| 007 | cr|||||||||||| | ||
| 008 | 141103s2007||||enk o ||1 0|eng|d | ||
| 020 | _a9780511536700 (ebook) | ||
| 020 | _z9780521837644 (hardback) | ||
| 040 |
_aUkCbUP _beng _erda _cUkCbUP |
||
| 050 | 0 | 0 |
_aTK5105.59 _b.O23 2007 |
| 082 | 0 | 0 |
_a005.8 _222 |
| 100 | 1 |
_aObaidat, Mohammad S. _q(Mohammad Salameh), _d1952- _eauthor. |
|
| 245 | 1 | 0 |
_aSecurity of e-systems and computer networks / _cMohammad Obaidat, Noureddine Boudriga. |
| 246 | 3 | _aSecurity of e-Systems & Computer Networks | |
| 264 | 1 |
_aCambridge : _bCambridge University Press, _c2007. |
|
| 300 |
_a1 online resource (xvii, 357 pages) : _bdigital, PDF file(s). |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). | ||
| 520 | _aE-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 700 | 1 |
_aBoudriga, Noureddine, _eauthor. |
|
| 776 | 0 | 8 |
_iPrint version: _z9780521837644 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1017/CBO9780511536700 |
| 999 |
_c520047 _d520045 |
||