Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and ManagementJohn Wiley & Sons, 2006. gada 13. marts - 1152 lappuses The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. |
No grāmatas satura
1.5. rezultāts no 81.
ii. lappuse
... electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.Wiley.com. Library of Congress Cataloging-in-Publication Data: The ...
... electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.Wiley.com. Library of Congress Cataloging-in-Publication Data: The ...
ix. lappuse
... Electronic Commerce Charles Steinfield EDI Security Matthew K. McGowan Electronic Payment Systems Indrajit Ray Intranets: Principals, Privacy, and Security Considerations William T. Schiano 15 37 49 77 87 97 110 126 151 164 179 189 205 ...
... Electronic Commerce Charles Steinfield EDI Security Matthew K. McGowan Electronic Payment Systems Indrajit Ray Intranets: Principals, Privacy, and Security Considerations William T. Schiano 15 37 49 77 87 97 110 126 151 164 179 189 205 ...
x. lappuse
... Information Security Charles Jaeger Online Stalking David J. Loundy 809 823 836 852 859 868 878 901 920 932 944 952 966 979 995 1007 1023 16 40 Electronic Attacks Thomas M. Chen, Jimi Thompson, and Matthew C. x CONTENTS.
... Information Security Charles Jaeger Online Stalking David J. Loundy 809 823 836 852 859 868 878 901 920 932 944 952 966 979 995 1007 1023 16 40 Electronic Attacks Thomas M. Chen, Jimi Thompson, and Matthew C. x CONTENTS.
xi. lappuse
... Electronic Attacks Thomas M. Chen, Jimi Thompson, and Matthew C. Elder Wireless Information Warfare Randall K. Nichols Computer Network Operations (CNO) Andrew Blyth Electronic Protection Neil C. Rowe Information Assurance Peng Liu ...
... Electronic Attacks Thomas M. Chen, Jimi Thompson, and Matthew C. Elder Wireless Information Warfare Randall K. Nichols Computer Network Operations (CNO) Andrew Blyth Electronic Protection Neil C. Rowe Information Assurance Peng Liu ...
xvi. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 2 Prevention Keeping the Hackers and Crackers at Bay | 261 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 3 Detection Recovery Management and Policy Considerations | 683 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 Reviewers List | 1051 |
Citi izdevumi - Skatīt visu
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
able access control activity administrators agent algorithm allow analysis applications approach associated attacks authentication authorized biometric called cause chapter ciphertext communication connection contain create database detection determine developed device e-mail effective encryption environment example execution Figure function granted host identify identity implementation important inside internal Internet issues Java known limited machine malicious means measures mechanisms method mobile Notes object operating organization packets password perform person physical possible practice prevent privileges problem protection protocol record referred result Retrieved server signal signature specific standard stored tags techniques threats tion Trojan trusted University virus viruses vulnerabilities wireless worm
Atsauces uz šo grāmatu
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Ierobežota priekšskatīšana - 2006 |