|
|
|
|
LEADER |
03391cmm a2200613 i 4500 |
001 |
ebook-233393773 |
005 |
20240116110025.0 |
007 |
cr|uuu---uuuuu |
008 |
190122s2018||||us ||||g|||| ||||||eng d |
020 |
|
|
|a 9780262346641
|
024 |
7 |
|
|a 10.7551/mitpress/11636.001.0001
|2 DOI
|
035 |
|
|
|a (OCoLC)1104233129
|
035 |
|
|
|a FRCYB08288862965
|
035 |
|
|
|a FRCYB14088862965
|
035 |
|
|
|a FRCYB17088862965
|
035 |
|
|
|a FRCYB19188862965
|
035 |
|
|
|a FRCYB20188862965
|
035 |
|
|
|a FRCYB24288862965
|
035 |
|
|
|a FRCYB24788862965
|
035 |
|
|
|a FRCYB26088862965
|
035 |
|
|
|a FRCYB26888862965
|
035 |
|
|
|a FRCYB27488862965
|
035 |
|
|
|a FRCYB29388862965
|
035 |
|
|
|a FRCYB29588862965
|
035 |
|
|
|a FRCYB55488862965
|
035 |
|
|
|a FRCYB55988862965
|
035 |
|
|
|a FRCYB57188862965
|
035 |
|
|
|a FRCYB88862965
|
035 |
|
|
|a FRCYB56788862965
|
040 |
|
|
|a ABES
|b fre
|e AFNOR
|
041 |
0 |
|
|a eng
|2 639-2
|
100 |
1 |
|
|0 (IdRef)076365352
|1 http://www.idref.fr/076365352/id
|a Shrobe, Howard E.
|d (1947-....).
|4 edt.
|e Éditeur scientifique
|
245 |
1 |
0 |
|a New solutions for cybersecurity
|c edited by Howard Shrobe, David L. Shrier, Alex Pentland.
|
256 |
|
|
|a Données textuelles.
|
264 |
|
1 |
|a Cambridge :
|b MIT Press,
|c 2018.
|
336 |
|
|
|b txt
|2 rdacontent
|
337 |
|
|
|b c
|2 rdamedia
|
337 |
|
|
|b b
|2 isbdmedia
|
338 |
|
|
|b ceb
|2 RDAfrCarrier
|
500 |
|
|
|a Couverture (http://static.cyberlibris.com/books_upload/136pix/9780262346641.jpg).
|
500 |
|
|
|a Titre provenant de la page de titre du document numérique.
|
500 |
|
|
|a La pagination de l'édition imprimée correspondante est de 502 p.
|
506 |
|
|
|a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition
|
520 |
|
|
|a Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.Ongoing cyberattacks, hacks, data breaches, and privacy concerns demonstrate vividly the inadequacy of existing methods of cybersecurity and the need to develop new and better ones. This book brings together experts from across MIT to explore recent advances in cybersecurity from management, technical, and sociological perspectives. Leading researchers from MIT's Computer Science & Artificial Intelligence Lab, the MIT Media Lab, MIT Sloan School of Management, and MIT Lincoln Lab, along with their counterparts at Draper Lab, the University of Cambridge, and SRI, discuss such varied topics as a systems perspective on managing risk, the development of inherently secure hardware, and the Dark Web. (Description plateforme)
|
538 |
|
|
|a Configuration requise : navigateur internet.
|
650 |
|
7 |
|0 (IdRef)040813215
|1 http://www.idref.fr/040813215/id
|a Sécurité informatique.
|2 ram
|
650 |
|
7 |
|0 (IdRef)161111947
|1 http://www.idref.fr/161111947/id
|a Contrôle d'intégrité (réseaux d'ordinateurs).
|2 ram
|
700 |
1 |
|
|0 (IdRef)249066998
|1 http://www.idref.fr/249066998/id
|a Shrier, David L..
|4 edt.
|e Éditeur scientifique
|
700 |
1 |
|
|0 (IdRef)050166069
|1 http://www.idref.fr/050166069/id
|a Pentland, Alex
|d (1952-....).
|4 edt.
|e Éditeur scientifique
|
856 |
|
|
|q HTML
|u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88862965
|w Données éditeur
|z Accès à l'E-book
|
886 |
2 |
|
|2 unimarc
|a 181
|a i#
|b xxxe##
|
993 |
|
|
|a E-Book
|
994 |
|
|
|a BNUM
|
995 |
|
|
|a 233393773
|