000 | 02782nam a22003495i 4500 | ||
---|---|---|---|
001 | 314930 | ||
003 | MX-SnUAN | ||
005 | 20160429160815.0 | ||
007 | cr nn 008mamaa | ||
008 | 160108s2015 xxk| s |||| 0|eng d | ||
020 |
_a9781447166542 _9978-1-4471-6654-2 |
||
035 | _avtls000414664 | ||
039 | 9 |
_y201601081054 _zstaff |
|
050 | 4 | _aQA75.5-76.95 | |
100 | 1 |
_aKizza, Joseph Migga, _eautor. _9302843 |
|
245 | 1 | 0 |
_aGuide to computer network security / _cJoseph Migga Kizza. |
250 | _a3rd ed. 2015. | ||
264 | 1 |
_aLondon : _bSpringer London : _bSpringer, _c2015. |
|
300 |
_axxii, 545 páginas : _b108 ilustraciones, 58 ilustraciones en color. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aComputer Communications and Networks, _x1617-7975 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aPart I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems -- Cloud Computing and Related Security Issues -- Virtualization Security -- Mobile Systems and Corresponding Intractable Security Issues -- Part V: Securing the Last Frontiers – The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-on Projects -- Projects. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9781447166535 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-4471-6654-2 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c314930 _d314930 |