skip to content
Handbook of information and communication security Preview this item
ClosePreview this item
Checking...

Handbook of information and communication security

Author: Peter Stavroulakis; Mark Stamp
Publisher: Heidelberg ; London : Springer, ©2010.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Covers some of the advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Handbook of information and communication security.
Heidelberg ; London : Springer, ©2010
(DLC) 2009943513
(OCoLC)432409403
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Peter Stavroulakis; Mark Stamp
ISBN: 9783642041174 3642041175
OCLC Number: 663093967
Description: 1 online resource (xvi, 867 pages) : illustrations
Contents: Part A Fundamentals and Cryptography; 1 A Framework for System Security; 2 Public-Key Cryptography; 3 Elliptic Curve Cryptography; 4 Cryptographic Hash Functions; 5 Block Cipher Cryptanalysis; 6 Chaos-Based Information Security; 7 Bio-Cryptography; 8 Quantum Cryptography; Part B Intrusion Detection and Access Control; 9 Intrusion Detection and Prevention Systems; 10 Intrusion Detection Systems; 11 Intranet Security via Firewalls; 12 Distributed Port Scan Detection; 13 Host-Based Anomaly Intrusion Detection; 14 Security in Relational Databases.
Responsibility: Peter Stavroulakis, Mark Stamp, editors.

Abstract:

The Springer Handbook of Information and Communication security provides I & C professionals, researchers as well as students with quickly retrievable information on relevant security topics.  Read more...

Reviews

Editorial reviews

Publisher Synopsis

Aus den Rezensionen:"... Besonderes Augenmerk gilt dabei dem Wechselspiel zwischen Kommunikation und dem Bereich der Informationssicherheit. ... herausgegriffene Themen illustrieren die Relevanz des Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/663093967> # Handbook of information and communication security
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "663093967" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/866864674#Place/heidelberg> ; # Heidelberg
   library:placeOfPublication <http://dbpedia.org/resource/London> ; # London
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/866864674#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
   schema:about <http://experiment.worldcat.org/entity/work/data/866864674#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/866864674#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/866864674#Topic/ingenierie> ; # Ingénierie
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/22376397> ; # Peter Stavroulakis
   schema:contributor <http://viaf.org/viaf/166059631> ; # Mark Stamp
   schema:copyrightYear "2010" ;
   schema:datePublished "2010" ;
   schema:description "Part A Fundamentals and Cryptography; 1 A Framework for System Security; 2 Public-Key Cryptography; 3 Elliptic Curve Cryptography; 4 Cryptographic Hash Functions; 5 Block Cipher Cryptanalysis; 6 Chaos-Based Information Security; 7 Bio-Cryptography; 8 Quantum Cryptography; Part B Intrusion Detection and Access Control; 9 Intrusion Detection and Prevention Systems; 10 Intrusion Detection Systems; 11 Intranet Security via Firewalls; 12 Distributed Port Scan Detection; 13 Host-Based Anomaly Intrusion Detection; 14 Security in Relational Databases."@en ;
   schema:description "Covers some of the advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/866864674> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/432409403> ;
   schema:name "Handbook of information and communication security"@en ;
   schema:productID "663093967" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/663093967#PublicationEvent/heidelberg_london_springer_2010> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/866864674#Agent/springer> ; # Springer
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=325596> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=571809> ;
   schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-642-04116-7> ;
   schema:url <http://site.ebrary.com/id/10369913> ;
   schema:url <http://proxy.library.carleton.ca/login?url=http://dx.doi.org/10.1007/978-3-642-04117-4> ;
   schema:url <http://proxy.library.carleton.ca/login?url=http://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks2/springer/2011-04-28/6/9783642041174> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=993570> ;
   schema:url <http://dx.doi.org/10.1007/978-3-642-04117-4> ;
   schema:url <https://grinnell.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-04117-4> ;
   schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-642-04116-7> ;
   schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-642-04117-4> ;
   schema:workExample <http://worldcat.org/isbn/9783642041174> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA982655> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/663093967> ;
    .


Related Entities

<http://dbpedia.org/resource/London> # London
    a schema:Place ;
   schema:name "London" ;
    .

<http://experiment.worldcat.org/entity/work/data/866864674#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/866864674#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/866864674#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
   schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/166059631> # Mark Stamp
    a schema:Person ;
   schema:familyName "Stamp" ;
   schema:givenName "Mark" ;
   schema:name "Mark Stamp" ;
    .

<http://viaf.org/viaf/22376397> # Peter Stavroulakis
    a schema:Person ;
   schema:familyName "Stavroulakis" ;
   schema:givenName "Peter" ;
   schema:name "Peter Stavroulakis" ;
    .

<http://worldcat.org/isbn/9783642041174>
    a schema:ProductModel ;
   schema:isbn "3642041175" ;
   schema:isbn "9783642041174" ;
    .

<http://www.worldcat.org/oclc/432409403>
    a schema:CreativeWork ;
   rdfs:label "Handbook of information and communication security." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/663093967> ; # Handbook of information and communication security
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.