Vyhledávat v databázi titulů je možné dle ISBN, ISSN, EAN, č. ČNB, OCLC či vlastního identifikátoru. Vyhledávat lze i v databázi autorů dle id autority či jména.
Projekt ObalkyKnih.cz sdružuje různé zdroje informací o knížkách do jedné, snadno použitelné webové služby. Naše databáze v tuto chvíli obsahuje 3151204 obálek a 950590 obsahů českých a zahraničních publikací. Naše API využívá většina knihoven v ČR.
Rok: 1997
ISBN: 9780201308204
OKCZID: 110113678
Citace (dle ČSN ISO 690):
DENNING, Dorothy Elizabeth Robling. Internet besieged: countering cyberspace scofflaws. Reading, Mass.: Addison-Wesley, c1988. 547 s.
Hodnocení:
3.5 / 5
(6 hlasů)
Break-ins on the Internet! Assaults on privacy! Theft of information! They are prohibited, yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce. Internet Besieged consists of over thirty original and recently published chapters written by leading figures in security. They range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks. Internet Besieged is organized for the general reader as well as the practicing professional. It covers: the emergence of the Internet-the evolution of security problems and required countermeasures; major patterns of weakness in Internet-connected computer systems and methods for preventing and detecting attacks; the use of cryptography to secure computers and data on the Internet; electronic commerce and secure transactions-authentication and integrity-checking technologies; foiling identity theft; and ethics, laws, practices, and policies that govern human interaction on the Internet. For software developers, system managers and engineers, students, and concerned citizens, this book provides a broad awareness of Internet security risk while exploring the social, legal, political, and ethical implications of security breaches and suggested countermeasures. Contributors include: Steve Bellovin, Matt Bishop, Bill Cheswick, Jim Christy, Stephen T. Kent, Steven Levy, Teresa Lunt, Peter G. Neumann, E. Eugene Schultz, Eugene H. Spafford, and Bruce Sterling.