000 05089cam a22008654a 4500
005 20250919212023.0
006 m o d
007 cr cnu---unuuu
008 171208s2006 njua ob 001 0 eng d
020 _a0471744182
_q(electronic bk.)
020 _a9780471744184
_q(electronic bk.)
020 _a9780471738480
_q(cloth)
020 _a0471738484
_q(cloth)
020 _a0471744190
_q(electronic bk.)
020 _a9780471744191
_q(electronic bk.)
020 _a1280241446
020 _a9781280241444
024 7 _a10.1002/0471744190
_2doi
029 1 _aAU@
_b000042132971
029 1 _aAU@
_b000048781669
029 1 _aDEBSZ
_b396074359
029 1 _aDEBSZ
_b430311435
029 1 _aDEBSZ
_b449073270
029 1 _aNZ1
_b11776724
029 1 _aNZ1
_b12277300
035 _a(OCoLC)62303924
_z(OCoLC)63651389
_z(OCoLC)85820655
_z(OCoLC)181839246
_z(OCoLC)489557665
_z(OCoLC)606165720
_z(OCoLC)607681727
_z(OCoLC)806202327
_z(OCoLC)814294262
035 _a(OCoLC)ocm62303924
037 _bOverDrive, Inc.
_nhttp://www.overdrive.com
037 _a310C0D18-7395-435E-BA71-41A0448F3D13
_bOverDrive, Inc.
_nhttp://www.overdrive.com
039 9 _a201902141034
_bmurni
_y12-08-2017
_zhafiz
_wMYUKM (1).mrc
_x54
040 _aNST
_beng
_epn
_cNST
_dOCLCQ
_dYDXCP
_dORE
_dOCLCQ
_dORE
_dOCLCQ
_dTEFOD
_dIDEBK
_dVT2
_dOCLCE
_dE7B
_dOCLCQ
_dREDDC
_dOCLCQ
_dOCLCF
_dDG1
_dWOS
_dOKU
_dDEBSZ
_dOCLCQ
_dMUX
_dNRU
_dUKDOC
_dTEFOD
_dEBLCP
_dCOO
_dOCLCQ
_dDG1
042 _adlr
049 _aMAIN
050 4 _aQA76.9.A25
_bS69 2006eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUT
_2bicssc
082 0 4 _a005.8
_222
100 1 _aStamp, Mark.
245 1 0 _aInformation security :
_bprinciples and practice /
_cMark Stamp.
260 _aHoboken, N.J. :
_bWiley-Interscience,
_c©2006.
300 _a1 online resource (xxi, 390 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references (pages 359-379) and index.
505 0 _aCrypto basics -- Symmetric key crypto -- Public key crypto -- Hash functions and other topics -- Advanced cryptanalysis -- Authentication -- Authorization -- Simple authentication protocols -- Real-world security protocols -- Software flaws and malware -- Insecurity in software -- Operating systems and security.
506 _3Use copy
_fRestrictions unspecified
_2star
_5MiAaHDL
520 1 _a'As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges.''Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.'--Jacket.
533 _aElectronic reproduction.
_b[S.l.] :
_cHathiTrust Digital Library,
_d2010.
_5MiAaHDL
538 _aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
_uhttp://purl.oclc.org/DLF/benchrepro0212
_5MiAaHDL
583 1 _adigitized
_c2010
_hHathiTrust Digital Library
_lcommitted to preserve
_2pda
_5MiAaHDL
588 0 _aPrint version record.
650 0 _aComputer security.
650 6 _aSécurité informatique.
650 6 _aOrdinateurs
_xAccès
_xContrôle.
650 6 _aLogiciels
_xProtection.
650 6 _aProtocoles de réseaux d'ordinateurs
_xSécurité
_xMesures.
650 6 _aCryptographie.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
655 4 _aElectronic books.
773 0 _tWiley e-books
776 0 8 _iPrint version:
_aStamp, Mark.
_tInformation security.
_dHoboken, N.J. : Wiley-Interscience, ©2006
_z0471738484
_w(DLC) 2005005152
_w(OCoLC)57754240
856 4 0 _uhttp://www.ezplib.ukm.edu.my/login?url=http://onlinelibrary.wiley.com/book/10.1002/0471744190
_zWiley Online Library
907 _a.b1653671x
_b2021-06-25
_c2019-11-12
942 _n0
914 _avtls003628593
998 _ae
_b2017-08-12
_cm
_dz
_feng
_gnju
_y0
_z.b1653671x
999 _c690138
_d690138