Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and ManagementJohn Wiley & Sons, 2006. gada 13. marts - 1152 lappuses The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. |
No grāmatas satura
1.–5. rezultāts no 74.
74. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
95. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
99. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
104. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
155. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 2 Prevention Keeping the Hackers and Crackers at Bay | 261 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 3 Detection Recovery Management and Policy Considerations | 683 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 Reviewers List | 1051 |
Citi izdevumi - Skatīt visu
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
access control access point activity administrators algorithm allow antivirus applets applications attacks authentication authorized biometric Bluetooth buffer overflow bytes chapter ciphertext client communication configuration countermeasures cryptographic database denial of service detection device e-mail electronic encryption environment example execution exploit firewall function hackers hardware hash hoaxes host identify identity IEEE implementation infected infrastructure inside Internet intruder IP address Java keystream MAC address machine malicious malware mechanisms Microsoft mobile agent mobile code monitor operating system packets password privileges problem protection protocol public key referred result Retrieved RFID scanning security policy server signal signature smart card spam specific spoofing spyware SSID standard stored tags target techniques template threats tion Trojan horse virus viruses vulnerabilities wireless network worm
Atsauces uz šo grāmatu
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Ierobežota priekšskatīšana - 2006 |