Countering cyber attacks and preserving the integrity and availability of critical systems
"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches...
| Other Authors: | , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference,
[2019]
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 02082cam a2200469Ii 4500 | ||
|---|---|---|---|
| 001 | koha001013103 | ||
| 003 | OCoLC | ||
| 005 | 20250222065949.0 | ||
| 006 | m d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 190131s2019 pau ob 000 0 eng d | ||
| 035 | |a koha001013103 | ||
| 040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T | ||
| 020 | |a 9781522582427 |q (electronic bk.) | ||
| 020 | |a 1522582428 |q (electronic bk.) | ||
| 020 | |z 9781522582410 | ||
| 020 | |z 152258241X | ||
| 050 | 4 | |a TK5105.59 |b .C648 2019eb | |
| 072 | 7 | |a COM |x 053000 |2 bisacsh | |
| 072 | 7 | |a COM |x 043050 |2 bisacsh | |
| 082 | 0 | 4 | |a 005.8/2 |2 23 |
| 049 | |a MAIN | ||
| 245 | 0 | 0 | |a Countering cyber attacks and preserving the integrity and availability of critical systems |c S. Geetha and Asnath Victy Phamila, editors. |
| 264 | 1 | |a Hershey, PA |b Information Science Reference, |c [2019] | |
| 300 | |a 1 online resource | ||
| 520 | |a "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- |c Provided by publisher. | ||
| 504 | |a Includes bibliographical references. | ||
| 588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed February 4, 2019) | |
| 653 | 0 | |a Computer networks |x Security measures. | |
| 653 | 0 | |a Computer crimes |x Prevention. | |
| 653 | 0 | |a Computer security. | |
| 653 | 7 | |a COMPUTERS / Security / General. |2 bisacsh | |
| 653 | 7 | |a COMPUTERS / Security / Networking. |2 bisacsh | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 700 | 1 | |a Geetha, S., |d 1979- |9 910985 | |
| 700 | 1 | |a Phamila, Asnath Victy, |d 1978- |9 910986 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/2013190.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013103 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1013103 |d 1013103 | ||
| 039 | |||
