Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Cyberspace Security and Defense: Research Issues (Record no. 499949)

000 -LEADER
fixed length control field 04702nam a22005175i 4500
001 - CONTROL NUMBER
control field 978-1-4020-3381-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20161121230521.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2005 ne | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781402033810
-- 978-1-4020-3381-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/1-4020-3381-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK7874.6
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQE
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM025000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 23
245 10 - TITLE STATEMENT
Title Cyberspace Security and Defense: Research Issues
Medium [electronic resource] :
Remainder of title Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004 /
Statement of responsibility, etc. edited by Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Dordrecht :
Name of producer, publisher, distributor, manufacturer Springer Netherlands,
Date of production, publication, distribution, manufacture, or copyright notice 2005.
300 ## - PHYSICAL DESCRIPTION
Extent X, 382 p.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement NATO Science Series II: Mathematics, Physics and Chemistry,
International Standard Serial Number 1568-2609 ;
Volume/sequential designation 196
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note General Security Issues -- IT Security Development -- A Case for Public and Private Review of Developing it Security Standards -- Assuring Critical Information Infrastructure -- Systemic Challenges for Critical Information Infrastructure Protection -- Decentralized Energy Supply to Secure Computer Systems -- Dependability -- Safety Analysis Methods—Software Development Questions -- Trust Case—A Case for Trustworthiness of IT Infrastructures -- Dependability, Structure, and Infrastructure -- Design for Safety and Security of Complex Embedded Systems: A Unified Approach -- Networks -- Design of Distributed Sensor Networks for Security and Defense -- A Distributed Approach to the Recognition of Geographically Located IP Devices -- Situational Awareness and Network Traffic Analysis -- Early Warning Information Systems and Secure Access Control -- Honeynets: Foundations for the Development of Early Warning Information Systems -- IRIS Biometrics for Secure Remote Access -- New Directions in Access Control -- Cryptography -- Improved Block Cipher Counter Mode of Operation Schemes -- Electronic Signature in Real World -- A Note on Two Significant Developments in Cyberspace Security and Defense -- A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol -- Intrusion Detection -- An Infrastructure for Distributed Event Acquisition -- Some Aspects of Neural Network Approach for Intrusion Detection.
520 ## - SUMMARY, ETC.
Summary, etc. Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security. Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security", the question is "How to do it".
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Special purpose computers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Special Purpose and Application-Based Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data Structures, Cryptology and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information Systems Applications (incl. Internet).
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kowalik, Janusz S.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gorski, Janusz.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sachenko, Anatoly.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9781402033797
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title NATO Science Series II: Mathematics, Physics and Chemistry,
International Standard Serial Number 1568-2609 ;
Volume/sequential designation 196
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/1-4020-3381-8
912 ## -
-- ZDB-2-SCS
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2016-11-21 EBK236 2016-11-21 2016-11-21 E books

Powered by Koha