This text shows how security is implemented in a computer world and the ways in which those checkpoints can be side-stepped by trespassers intent on doing harm.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
As a complete overview of Internet and network security, this guide explains the means by which security is implemented in a variety of computing environments.-- Points out the inconsistencies, weaknesses, and breaches in existing computer security implementations-- Takes a comprehensive look at Internet and network security/loopholes, including Firewalls, PGP, Public and Private Keys, digital cash, Digital Signatures, and the Clipper chip-- Uses understandable definitions instead of meaningless technical jargon
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 5,73 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Zustand: Good. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Artikel-Nr. 45645934-20
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Artikel-Nr. GRP79327019
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Artikel-Nr. 8433641-6
Anzahl: 1 verfügbar
Anbieter: Wonder Book, Frederick, MD, USA
Zustand: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain a few markings such as an owner's name, short gifter's inscription or light stamp. Artikel-Nr. L18A-01701
Anzahl: 1 verfügbar