MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
100303s2009 njua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2008034570 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780470519882 (cloth) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u4205 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 245 00 - TITLE STATEMENT |
| Title |
Distributed systems security issues, processes, and solutions / |
| Statement of responsibility, etc. |
Abhijit Belapurkar ... [et al.]. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Hoboken, NJ : |
| Name of publisher, distributor, etc. |
John Wiley & Sons, |
| Date of publication, distribution, etc. |
2009. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxv, 307 p. ; |
| Dimensions |
22 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1 Introduction -- Chapter 2 Security Engineering. -- Chapter 3 Common Security Issues and Technologies. -- Chapter 4 Host level Threats and Vulnerabilities. -- Chapter 5 Infrastructure Level Threats & Vulnerabilities. -- Chapter 6 Application Level Vulnerabilities and Attacks. -- Chapter 7 Service Level Issues, Threats and Vulnerabilities. -- Chapter 8 Host level Solutions. -- Chapter 9 Infrastructure Level Solutions -- Chapter 10 Application Level Solutions. -- Chapter 11 Service Level Solutions. -- Chapter 12 Case Study – Compliance in Financial Services. -- Chapter 13 Case Study of Grid. -- Chapter 14 Future directions and Conclusions. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This book outlines and describes the impact of the latest trends in distributed systems on security threats, and solutions addressing these threats; with an exhaustive overview of the underlying theoretical underpinnings of security technologies, along with an in-depth coverage of the existing and upcoming security threats and vulnerabilities across different layers of a modern day distributed systems architecture. The book also looks at how existing solutions can be leveraged or enhanced to proactively meet the dynamic and evolving needs of security for the next-generation distributed systems of tomorrow. The book also discusses the applications of the technologies and solutions discussed, providing case studies of real distributed systems that the authors have been involved in architecting, developing and running to meet very stringent reliability and security requirements. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Distributed Systems Security provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today’s distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model –host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverage of security threats and issues across these tiers. Additionally the authors describe the approaches required for efficient security engineering, alongside exploring how existing solutions can be leveraged or enhanced to proactively meet the dynamic needs of security for the next-generation distributed systems. The practical issues thereof are reinforced via practical case studies. |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 9 (RLIN) |
8353 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Electronic data processing |
| General subdivision |
Distributed processing. |
| 9 (RLIN) |
8354 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Internet |
| General subdivision |
Security measures. |
| 9 (RLIN) |
8355 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Belapurkar, Abhijit. |
| 9 (RLIN) |
8356 |