Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and ManagementJohn Wiley & Sons, 2006. gada 13. marts - 1152 lappuses The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. |
No grāmatas satura
1.5. rezultāts no 94.
19. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
22. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
26. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
27. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
31. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 2 Prevention Keeping the Hackers and Crackers at Bay | 261 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 3 Detection Recovery Management and Policy Considerations | 683 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 Reviewers List | 1051 |
Citi izdevumi - Skatīt visu
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
able access control activity administrators agent algorithm allow analysis applications approach associated attacks authentication authorized biometric called cause chapter ciphertext communication connection contain create database detection determine developed device e-mail effective encryption environment example execution Figure function granted host identify identity implementation important inside internal Internet issues Java known limited machine malicious means measures mechanisms method mobile Notes object operating organization packets password perform person physical possible practice prevent privileges problem protection protocol record referred result Retrieved server signal signature specific standard stored tags techniques threats tion Trojan trusted University virus viruses vulnerabilities wireless worm
Atsauces uz šo grāmatu
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Ierobežota priekšskatīšana - 2006 |