Security for Ubiquitous Computing (Αριθ. εγγραφής 93235)

Στοιχεία MARC
000 -LEADER
fixed length control field 02141nam a2200277 u 4500
001 - CONTROL NUMBER
control field 10107112
003 - CONTROL NUMBER IDENTIFIER
control field upatras
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210831104331.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 041111s gre
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0470 84493 0
040 ## - CATALOGING SOURCE
Original cataloging agency Ινστιτούτο Τεχνολογίας Υπολογιστών
Transcribing agency Ινστιτούτο Τεχνολογίας Υπολογιστών
040 ## - CATALOGING SOURCE
Original cataloging agency XX-XxUND
Transcribing agency Ινστιτούτο Τεχνολογίας Υπολογιστών
082 14 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21η
245 10 - TITLE STATEMENT
Title Security for Ubiquitous Computing
Statement of responsibility, etc. Frank Stajano
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. England
Name of publisher, distributor, etc. John Wiley & Sons
Date of publication, distribution, etc. c2002
300 ## - PHYSICAL DESCRIPTION
Extent xix,247p.
Other physical details fig.
490 1# - SERIES STATEMENT
Series statement Wiley Series in Communications Networking & Distributed Systems / David Hutchison ed.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Annotated bibliography :pp. 204 - 243, index : pp. 244 - 247
505 1# - FORMATTED CONTENTS NOTE
Formatted contents note About the author
-- Foreword
-- Preface
-- Acknowledgements
-- Contact information
-- 1.Introduction
-- 1.1.Scenario
-- 1.2.Essential terminology
-- 1.3.Problems
-- 1.4.Notation
-- 2.Ubiquitous computing
-- 2.1.Xerox PARC
-- 2.2.Norman's Invisible Computer
-- 2.3MIT
-- 2.4 HP's Cooltown
-- 2.5 ORL/AT&T Labs Cambridge
-- 2.6 Security issues
-- 3.Computer security
-- 3.1 Confidentiality
-- 3.2 Integrity
-- 3.3 Availability
-- 3.4 Authentication
-- 3.5 Security policies
-- 4.Authentication
-- 4.1 New preconditions
-- 4.2 The Resurrecting Duckling security policy model
-- 4.3 The many ways of being a master
-- 5. Confidentiality
-- 5.1 Cryptographic primitives for peanut processors
-- 5.2 Personal privacy
-- 6. Integrity
-- 6.1 Message integrity
-- 6.2 Device integrity
-- 7. Availability
-- 7.1 Threats to the communications channel
-- 7.2 Threats to the battery energy
-- 7.3 Threats from mobile code
-- 8. Anonymity
-- 8.1 The Cocaine Auction Protocol
-- 8.2 The anonymity layer
-- 9. Conclusions
-- A. A short primer on fuctions
-- B. Existing network security solutions
-- Annotated bibliography
-- Index
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Ασφάλεια ηλεκτρονικών υπολογιστών
9 (RLIN) 2048
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTER NETWORKS
9 (RLIN) 24291
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element ΕΜ3
9 (RLIN) 122124
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Stajano, Frank
Relator code aut
9 (RLIN) 127972
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book [21]
Αντίτυπα
Lost status Home library Current library Total Checkouts Full call number
  Μηχανικών Η/Υ και Πληροφορικής Μηχανικών Η/Υ και Πληροφορικής   005.8 STA
Πανεπιστήμιο Πατρών, Βιβλιοθήκη & Κέντρο Πληροφόρησης, 265 04, Πάτρα
Τηλ: 2610969621, Φόρμα επικοινωνίας
Εικονίδιο Facebook Εικονίδιο Twitter Εικονίδιο Soundcloud