It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03560cam 2200589 a 4500
001 ocm74968237
003 OCoLC
005 20200923182350.0
008 061030s2007 sz a b 000 0 eng
040 $aUKM$beng$cUKM$dBAKER$dBTCTA$dYDXCP$dTXA$dSZ9XM$dOKU$dDEBBG$dOCL$dCNCGM$dBDX$dOCLCF$dOCLCO$dOCLCQ$dOCLCA$dUKMGB$dQE2
015 $aGBA692445$2bnb
016 7 $a013590229$2Uk
020 $a9781420046205$q(CRC Press ;$qcased)
020 $a1420046209$q(CRC Press ;$qcased)
020 $a9782940222148$q(EPFL Press ;$qcased)
020 $a2940222142$q(EPFL Press ;$qcased)
035 $a(OCoLC)74968237
041 1 $aeng$hfre
042 $aukblcatcopy
050 4 $aQA76.9.A25$bA875 2007
082 04 $a005.8$222
084 $aST 276$2rvk
084 $aST 277$2rvk
100 1 $aAvoine, Gildas.
245 10 $aComputer system security :$bbasic concepts and solved exercises /$cGildas Avoine, Pascal Junod and Philippe Oechslin.
260 $aLausanne :$bEPFL Press ;$a[London] :$b[Taylor & Francis, distributor],$c©2007.
300 $axii, 260 pages :$billustrations ;$c25 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aComputer and communication sciences
504 $aIncludes bibliographical references.
505 0 $aForged e-mail and spam -- Malwares -- Network and application vulnerabilities -- Firewalls and proxies -- Cryptography -- Secure communications -- Security at the user level -- Management of information security.
520 1 $a"Computer networks are the spinal cord of our civilisation; because of the huge stakes involved, universities and certain companies must now teach the basics of computer system security. The purpose of this book is to help people learn about the fundamentals of this field through the study of solved exercises. The primary goal is not to create experts in this domain, but rather to teach the concepts required to understand the risks and consequences of computer system misuse." "This work is an addition to the literature in that it gives, for each subject, a short summary of the main principles followed by a series of exercises (with solutions), resulting in a self-contained book that provides a solid foundation in computer security to students. Chapters in this book have been conceived to be as independent as possible. All of them, nevertheless, require a background in computer science and a familiarity with the most common network protocols."--Cover.
650 0 $aComputer security.
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aComputersicherheit$vLehrbuch.$2swd
700 1 $aJunod, Pascal.
700 1 $aOechslin, Philippe.
776 08 $iOnline version:$aAvoine, Gildas.$tComputer system security.$dLausanne : EPFL Press ; [London : Taylor & Francis, distributor], ©2007$w(OCoLC)681471013
830 0 $aComputer and communication sciences.
856 41 $3Table of contents$uhttp://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015673716&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
938 $aBaker & Taylor$bBKTY$c54.95$d54.95$i1420046209$n0006943079$sactive
938 $aBrodart$bBROD$n06049109$c$54.95
938 $aBaker and Taylor$bBTCP$nBK0006943079
938 $aYBP Library Services$bYANK$n2479200
029 1 $aAU@$b000042120966
029 1 $aDEBBG$bBV022466126
029 1 $aNZ1$b11090892
029 1 $aUKMGB$b013590229
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 100 OTHER HOLDINGS