000 04488cam a2200817Ma 4500
005 20250930145648.0
006 m o d
007 cr cn|||||||||
008 171212s2008 enka ob 001 0 eng d
010 _z2007-037133
020 _a9780470023259
_q(electronic bk.)
020 _a0470023252
_q(electronic bk.)
020 _a9780470023273
020 _a0470023279
020 _a1281318051
020 _a9781281318053
020 _z9780470023242
_q(pbk.)
020 _z0470023244
_q(pbk.)
024 7 _a10.1002/9780470023273
_2doi
029 1 _aAU@
_b000048125855
029 1 _aAU@
_b000051410807
029 1 _aDEBBG
_bBV043152005
029 1 _aDEBSZ
_b422114715
029 1 _aDEBSZ
_b430494602
029 1 _aDKDLA
_b820120-katalog:000503096
029 1 _aGBVCP
_b803142390
029 1 _aNZ1
_b13340638
035 _a(OCoLC)608622648
_z(OCoLC)243467436
_z(OCoLC)264714695
_z(OCoLC)476172202
_z(OCoLC)646751235
_z(OCoLC)806201470
_z(OCoLC)815565983
_z(OCoLC)858436218
_z(OCoLC)961525986
_z(OCoLC)962723720
035 _a(OCoLC)ocn608622648
037 _a9780470023273
_bWiley InterScience
_nhttp://www3.interscience.wiley.com
039 9 _a201902121201
_bemilda
_c201902121031
_demilda
_y12-12-2017
_zhafiz
_wMYUKM (1).mrc
_x238
040 _aMERUC
_beng
_epn
_cMERUC
_dE7B
_dOCLCQ
_dNST
_dYDXCP
_dIDEBK
_dOCLCQ
_dOCLCF
_dOCLCQ
_dDG1
_dEBLCP
_dUKDOC
_dDEBSZ
_dOCLCO
_dOCLCQ
_dOCLCO
_dCOO
_dOCLCO
_dOCLCQ
_dOCLCO
_dAZK
_dDG1
049 _aMAIN
050 4 _aTK5105.59
_b.Y44 2008eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUXAS
_2bicssc
082 0 4 _a005.8
_222
100 1 _aYe, Nong.
245 1 0 _aSecure computer and network systems :
_bmodeling, analysis and design /
_cNong Ye.
260 _aChichester, England ;
_aHoboken, NJ :
_bJ. Wiley & Sons,
_c©2008.
300 _a1 online resource (xvii, 336 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aSecure Computer and Network Systems; Contents; Preface; Part I An Overview of Computer and Network Security; 1 Assets, Vulnerabilities and Threats of Computer and Network Systems; 2 Protection of Computer and Network Systems; Part II Secure System Architecture and Design; 3 Asset Protection-Driven, Policy-Based Security Protection Architecture; 4 Job Admission Control for Service Stability; 5 Job Scheduling Methods for Service Differentiation and Service Stability; 6 Job Reservation and Service Protocols for End-To-End Delay Guarantee.
520 _aComputer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.℗¡. This book presents quantitative modeling and an.
588 0 _aPrint version record.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer networks
_xDesign and construction.
650 0 _aComputer security.
650 4 _aComputer networks.
_959483
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xDesign and construction.
_2fast
_0(OCoLC)fst00872309
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
655 4 _aElectronic books.
773 0 _tWiley e-books
776 0 8 _iPrint version:
_aYe, Nong.
_tSecure computer and network systems.
_dChichester, England ; Hoboken, NJ : J. Wiley & Sons, ©2008
_w(DLC) 2007037133
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9780470023273
_zWiley Online Library
907 _a.b16539849
_b2022-11-04
_c2019-11-12
942 _n0
914 _avtls003628910
998 _ae
_b2017-12-12
_cm
_dz
_feng
_genk
_y0
_z.b16539849
999 _c688927
_d688927