Description |
1 online resource (viii, 205 pages) : illustrations |
Series |
NATO security through science series. D, Information and communication security ; v. 6 |
|
NATO security through science series. D, Information and communication security ; v. 6.
|
Contents |
Title page; Preface; Contents; Theory; Tools; Architecture; Applications; Author Index |
Summary |
Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intel |
Notes |
"Proceedings of the NATO Advanced Research Workshop on Information Assurance and Computer Security 2005, Tetuan, Morocco, 3-4 June 2005"--Title page verso |
Bibliography |
Includes bibliographical references and author index |
Notes |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
|
Print version record |
|
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Subject |
Computer security
|
|
Data protection.
|
|
Computer Security
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer security
|
|
Data protection
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Thomas, Johnson P
|
|
Essaaidi, Mohamed
|
LC no. |
2006935041 |
ISBN |
9781429467643 |
|
1429467649 |
|
1433701529 |
|
9781433701528 |
|
9781607502098 |
|
1607502097 |
|