Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and ManagementJohn Wiley & Sons, 2006 M03 13 - 1152 páginas The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. |
Contenido
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 2 Prevention Keeping the Hackers and Crackers at Bay | 261 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 PART 3 Detection Recovery Management and Policy Considerations | 683 |
Threats Vulnerabilities Prevention Detection and Management Volume 3 Reviewers List | 1051 |
Otras ediciones - Ver todas
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Sin vista previa disponible - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Sin vista previa disponible - 2006 |
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Sin vista previa disponible - 2006 |
Términos y frases comunes
able access control activity administrators agent algorithm allow analysis applications approach associated attacks authentication authorized biometric called cause chapter ciphertext communication connection contain create database detection determine developed device e-mail effective encryption environment example execution Figure function granted host identify identity implementation important inside internal Internet issues Java known limited machine malicious means measures mechanisms method mobile Notes object operating organization packets password perform person physical possible practice prevent privileges problem protection protocol record referred result Retrieved server signal signature specific standard stored tags techniques threats tion Trojan trusted University virus viruses vulnerabilities wireless worm
Referencias a este libro
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Vista previa limitada - 2006 |