This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security – R&D for hardware, software, systems, and architecture; and the corresponding products.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security – R&D for hardware, software, systems, and architecture; and the corresponding products.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 60,00 für den Versand von Deutschland nach USA
Versandziele, Kosten & DauerAnbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book addresses the broad sweep of issues above: the nature of the threat and system vulnerabilities; cryptography; software vulnerabilities; the Common Criteria; the World Wide Web and Internet; managing risk; and legal, ethical and privacy issues. The book also describes security controls that are currently available such as encryption protocols, software development practices, firewalls, and intrusion-detection systems. Overall, this book provides a broad and sound foundation for the information-system specialist who is charged with planning and organizing or managing and/or implementing a comprehensive information-system security program. Yet to be solved are many technical aspects of information security ¿ R&D for hardware, software, systems, and architecture; and the corresponding products.Books on Demand GmbH, Überseering 33, 22297 Hamburg 148 pp. Englisch. Artikel-Nr. 9786202064804
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 148 pages. 8.66x5.91x0.34 inches. In Stock. Artikel-Nr. zk6202064803
Anzahl: 1 verfügbar