This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security – R&D for hardware, software, systems, and architecture; and the corresponding products.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security – R&D for hardware, software, systems, and architecture; and the corresponding products.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 23 expédition depuis Allemagne vers Etats-Unis
Destinations, frais et délaisVendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security - R&D for hardware, software, systems, and architecture; and the corresponding products. 148 pp. Englisch. N° de réf. du vendeur 9786202064804
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Jebastian JayarajJAYARAJ Jebastian is an internationally known expert on English Literature and Linguistics. He is originally an Assistant Professor of English at Don Bosco College, Dharmapuri, Tamil Nadu.This book addresses the . N° de réf. du vendeur 385924147
Quantité disponible : Plus de 20 disponibles
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. Neuware -This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security ¿ R&D for hardware, software, systems, and architecture; and the corresponding products.Books on Demand GmbH, Überseering 33, 22297 Hamburg 148 pp. Englisch. N° de réf. du vendeur 9786202064804
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security - R&D for hardware, software, systems, and architecture; and the corresponding products. N° de réf. du vendeur 9786202064804
Quantité disponible : 1 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 148 pages. 8.66x5.91x0.34 inches. In Stock. N° de réf. du vendeur zk6202064803
Quantité disponible : 1 disponible(s)