Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management
John Wiley & Sons, 2006. gada 13. marts - 1152 lappuses
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 2 Prevention Keeping the Hackers and Crackers at Bay
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 3 Detection Recovery Management and Policy Considerations
Threats Vulnerabilities Prevention Detection and Management Volume 3 Reviewers List
Citi izdevumi - Skatīt visu
able access control activity administrators agent algorithm allow analysis applications approach associated attacks authentication authorized biometric called cause chapter ciphertext communication connection contain create database detection determine developed device e-mail effective encryption environment example execution Figure function granted host identify identity implementation important inside internal Internet issues Java known limited machine malicious means measures mechanisms method mobile Notes object operating organization packets password perform person physical possible practice prevent privileges problem protection protocol record referred result Retrieved server signal signature specific standard stored tags techniques threats tion Trojan trusted University virus viruses vulnerabilities wireless worm