MARC details
000 -LEADER |
fixed length control field |
03434cam a2200445 a 4500 |
001 - CONTROL NUMBER |
control field |
SCSB-9302108 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190807065807.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100625s2011 enka b 001 0 eng |
009 - PHYSICAL DESCRIPTION FIXED-FIELD FOR ARCHIVAL COLLECTION (VM) [OBSOLETE] |
fixed length control field |
6377269 |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010027364 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBB090858 |
Source |
bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
015612595 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780521119320 (hardback) |
024 ## - OTHER STANDARD IDENTIFIER |
Terms of availability |
14676.00 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn644662962 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)644662962 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
AUI |
Modifying agency |
YDX |
-- |
BTCTA |
-- |
UKM |
-- |
YDXCP |
-- |
CDX |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
PULT |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.A45 2011 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Alpcan, Tansu, |
Dates associated with a name |
1975- |
Authority record control number or standard number |
http://id.loc.gov/authorities/names/n2010041388 |
245 10 - TITLE STATEMENT |
Title |
Network security : |
Remainder of title |
a decision and game-theoretic approach / |
Statement of responsibility, etc. |
Tansu Alpcan and Tamer Başar. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cambridge, UK ; |
-- |
New York : |
Name of publisher, distributor, etc. |
Cambridge University Press, |
Date of publication, distribution, etc. |
2011. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 314 p. |
Other physical details |
ill. ; |
Dimensions |
26 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security"--Provided by publisher. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Network security is an important, challenging, and multi-dimensional research field.In its study, theory and practice should function together as parts of a feedback loop.Game, optimization, and control theories, among others, provide a mathematical foundation to formalize the multitude of decision-making processes in network security. The analytical approaches and quantitative frameworks presented lead to better allocation of limited resources and result in more informed responses to security problems in complex networked systems and organizations"--Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
Authority record control number or standard number |
http://id.loc.gov/authorities/subjects/sh94001277 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Game theory. |
Authority record control number or standard number |
http://id.loc.gov/authorities/subjects/sh85052941 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Başar, Tamer. |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Cover image |
Uniform Resource Identifier |
<a href="http://assets.cambridge.org/97805211/19320/cover/9780521119320.jpg">http://assets.cambridge.org/97805211/19320/cover/9780521119320.jpg</a> |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
a |
tja |
b |
s |
6 |
a |
7 |
m |
d |
v |
f |
1 |
e |
20110125 |
904 ## - LOCAL DATA ELEMENT D, LDD (RLIN) |
a |
tja |
b |
a |
h |
m |
c |
b |
e |
20110125 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book 1 (Do Not Chose) |