Στοιχεία MARC
000 -LEADER |
fixed length control field |
02141nam a2200277 u 4500 |
001 - CONTROL NUMBER |
control field |
10107112 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
upatras |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210831104331.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
041111s gre |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0470 84493 0 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
Ινστιτούτο Τεχνολογίας Υπολογιστών |
Transcribing agency |
Ινστιτούτο Τεχνολογίας Υπολογιστών |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
XX-XxUND |
Transcribing agency |
Ινστιτούτο Τεχνολογίας Υπολογιστών |
082 14 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
21η |
245 10 - TITLE STATEMENT |
Title |
Security for Ubiquitous Computing |
Statement of responsibility, etc. |
Frank Stajano |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
England |
Name of publisher, distributor, etc. |
John Wiley & Sons |
Date of publication, distribution, etc. |
c2002 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix,247p. |
Other physical details |
fig. |
490 1# - SERIES STATEMENT |
Series statement |
Wiley Series in Communications Networking & Distributed Systems / David Hutchison ed. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Annotated bibliography :pp. 204 - 243, index : pp. 244 - 247 |
505 1# - FORMATTED CONTENTS NOTE |
Formatted contents note |
About the author |
-- |
Foreword |
-- |
Preface |
-- |
Acknowledgements |
-- |
Contact information |
-- |
1.Introduction |
-- |
1.1.Scenario |
-- |
1.2.Essential terminology |
-- |
1.3.Problems |
-- |
1.4.Notation |
-- |
2.Ubiquitous computing |
-- |
2.1.Xerox PARC |
-- |
2.2.Norman's Invisible Computer |
-- |
2.3MIT |
-- |
2.4 HP's Cooltown |
-- |
2.5 ORL/AT&T Labs Cambridge |
-- |
2.6 Security issues |
-- |
3.Computer security |
-- |
3.1 Confidentiality |
-- |
3.2 Integrity |
-- |
3.3 Availability |
-- |
3.4 Authentication |
-- |
3.5 Security policies |
-- |
4.Authentication |
-- |
4.1 New preconditions |
-- |
4.2 The Resurrecting Duckling security policy model |
-- |
4.3 The many ways of being a master |
-- |
5. Confidentiality |
-- |
5.1 Cryptographic primitives for peanut processors |
-- |
5.2 Personal privacy |
-- |
6. Integrity |
-- |
6.1 Message integrity |
-- |
6.2 Device integrity |
-- |
7. Availability |
-- |
7.1 Threats to the communications channel |
-- |
7.2 Threats to the battery energy |
-- |
7.3 Threats from mobile code |
-- |
8. Anonymity |
-- |
8.1 The Cocaine Auction Protocol |
-- |
8.2 The anonymity layer |
-- |
9. Conclusions |
-- |
A. A short primer on fuctions |
-- |
B. Existing network security solutions |
-- |
Annotated bibliography |
-- |
Index |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Ασφάλεια ηλεκτρονικών υπολογιστών |
9 (RLIN) |
2048 |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTER NETWORKS |
9 (RLIN) |
24291 |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
ΕΜ3 |
9 (RLIN) |
122124 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stajano, Frank |
Relator code |
aut |
9 (RLIN) |
127972 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book [21] |