This text shows how security is implemented in a computer world and the ways in which those checkpoints can be side-stepped by trespassers intent on doing harm.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
As a complete overview of Internet and network security, this guide explains the means by which security is implemented in a variety of computing environments.-- Points out the inconsistencies, weaknesses, and breaches in existing computer security implementations-- Takes a comprehensive look at Internet and network security/loopholes, including Firewalls, PGP, Public and Private Keys, digital cash, Digital Signatures, and the Clipper chip-- Uses understandable definitions instead of meaningless technical jargon
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: Wonder Book, Frederick, MD, USA
Zustand: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain a few markings such as an owner's name, short gifter's inscription or light stamp. Artikel-Nr. L18A-01701
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Artikel-Nr. 8433641-6
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Artikel-Nr. GRP79327019
Anzahl: 1 verfügbar
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Zustand: Good. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Artikel-Nr. 45645934-20
Anzahl: 1 verfügbar