In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : Bay State Book Company, North Smithfield, RI, Etats-Unis
Etat : very_good. N° de réf. du vendeur BSM.1309K
Quantité disponible : 1 disponible(s)
Vendeur : Brook Bookstore On Demand, Napoli, NA, Italie
Etat : new. Questo è un articolo print on demand. N° de réf. du vendeur 6ac72381bfe8d6a3ccd67ca787c3d695
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
Hardcover. Etat : New. N° de réf. du vendeur 6666-ELS-9780123735669
Quantité disponible : Plus de 20 disponibles
Vendeur : The Book Spot, Sioux Falls, MN, Etats-Unis
Hardcover. Etat : New. N° de réf. du vendeur Abebooks7200
Quantité disponible : 1 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. pp. xxxvii + 537 Illus. N° de réf. du vendeur 4212328
Quantité disponible : 3 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Hardcover. Etat : Brand New. illustrated edition. 576 pages. 9.50x8.00x1.25 inches. In Stock. N° de réf. du vendeur __0123735661
Quantité disponible : 2 disponible(s)
Vendeur : Chiron Media, Wallingford, Royaume-Uni
Hardcover. Etat : New. N° de réf. du vendeur 6666-GRD-9780123735669
Quantité disponible : 2 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). 576 pp. Englisch. N° de réf. du vendeur 9780123735669
Quantité disponible : 2 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 5242851-n
Quantité disponible : 2 disponible(s)
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
Etat : New. Offers comprehensive coverage of both survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance. This book addresses this issue by detailing the sufficient capacity networked systems that need to operate while under attack. Series: The Morgan Kaufmann Series in Networking. Num Pages: 576 pages, Approx. 130 illustrations. BIC Classification: UT. Category: (P) Professional & Vocational. Dimension: 241 x 199 x 37. Weight in Grams: 1154. . 2007. Illustrated. hardcover. . . . . N° de réf. du vendeur V9780123735669
Quantité disponible : 2 disponible(s)