Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008679663/catalog> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- catalog contributor b12159693.
- catalog created "2001.".
- catalog date "2001".
- catalog date "2001.".
- catalog dateCopyrighted "2001.".
- catalog description "Includes bibliographical references (pages 307-316) and index.".
- catalog description "pt. I. Is There Really a Threat? 1. Shrouded in Secrecy. 2. Computer Security Risks. 3. The Morris Worm Meets the Love Bug: Computer Viruses and Worms -- pt. II. Storing Data Securely. 4. Local Storage. 5. Remote Storage. 6. Secure Backup -- pt. III. Secure Data Transfer. 7. Setting up a Long-Term Association. 8. Deriving Session Keys. 9. Communicating Securely After Key Setup -- pt. IV. Protecting Against Network Threats. 10. Protecting a Network Perimeter. 11. Defending against Attacks -- pt. V. Commerce and Privacy. 12. Protecting E-Commerce Transactions. 13. Protecting Privacy.".
- catalog extent "xxvii, 330 p. :".
- catalog hasFormat "White-hat security arsenal.".
- catalog identifier "0201711141".
- catalog isFormatOf "White-hat security arsenal.".
- catalog issued "2001".
- catalog issued "2001.".
- catalog language "eng".
- catalog publisher "Boston, MA : Addison-Wesley,".
- catalog relation "White-hat security arsenal.".
- catalog subject "005.8 21".
- catalog subject "Computer networks Security measures.".
- catalog subject "TK5105.59 .R833 2001".
- catalog subject "Web sites Security measures.".
- catalog subject "World Wide Web Security measures.".
- catalog tableOfContents "pt. I. Is There Really a Threat? 1. Shrouded in Secrecy. 2. Computer Security Risks. 3. The Morris Worm Meets the Love Bug: Computer Viruses and Worms -- pt. II. Storing Data Securely. 4. Local Storage. 5. Remote Storage. 6. Secure Backup -- pt. III. Secure Data Transfer. 7. Setting up a Long-Term Association. 8. Deriving Session Keys. 9. Communicating Securely After Key Setup -- pt. IV. Protecting Against Network Threats. 10. Protecting a Network Perimeter. 11. Defending against Attacks -- pt. V. Commerce and Privacy. 12. Protecting E-Commerce Transactions. 13. Protecting Privacy.".
- catalog title "White-hat security arsenal / Aviel D. Rubin.".
- catalog type "text".