Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
EUR 8,38
Anzahl: 1 verfügbar
In den WarenkorbZustand: Fair. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In fair condition, suitable as a study copy. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,550grams, ISBN:9780849300677.
Verlag: Wiley & Sons, Incorporated, John, 1999
ISBN 10: 0780347447 ISBN 13: 9780780347441
Sprache: Englisch
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
Zustand: Very Good. 1st Edition. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Verlag: Springer-Verlag New York Inc., 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Sprache: Englisch
Anbieter: Ammareal, Morangis, Frankreich
Hardcover. Zustand: Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2002. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2002. Ammareal gives back up to 15% of this item's net price to charity organizations.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 20,82
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. xxxi + 300 Illus.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 21,53
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 266 Illus.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 27,39
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 240 Illus., Maps.
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
EUR 23,79
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,750grams, ISBN:9780780347441.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 39,21
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 444 Illus.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Verlag: Springer, New York and Berlin, 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Sprache: Englisch
Anbieter: CURIO, Cleethorpes, North East Lincolnshire, Vereinigtes Königreich
Erstausgabe
EUR 17,56
Anzahl: 4 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. No Jacket. 1st Edition. First Edition / First Print (number line on copyright page 9 8 7 6 5 4 3 2 1). Hardback copy in pictorial boards, no dustjacket as issued. 209pp. B/w charts and graphs throughout. Light wear to board edges. A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. (22/1).
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 65,13
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. xiv + 252 Illus.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Antiquariat Thomas Haker GmbH & Co. KG, Berlin, Deutschland
Verbandsmitglied: GIAQ
Hardcover/Pappeinband. 441 p. Very good. Shrink wrapped. / Sehr guter Zustand. In Folie verschweißt. Sprache: Englisch Gewicht in Gramm: 860.
hardcover. Zustand: Very Good.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,74
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 266 pages. 9.61x6.69x0.61 inches. In Stock.
Anbieter: Cotswold Internet Books, Cheltenham, Vereinigtes Königreich
EUR 86,00
Anzahl: 1 verfügbar
In den WarenkorbZustand: Used - Very Good. VG hardback. Second edition. A nice, bright, clean copy. Small spots on front cover. Used - Very Good. VG hardback.
Gebunden. Zustand: Gut. Gebraucht - Gut Verlagsmängelex., XXVI, 209 p. 91 illus This new book outlines and establishes a comprehensive framework for network security which unifies the many definitions of network security and enables users from all sectors to employ the same framework to discuss, compare, and implement network security. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. An integrated, security-on-demand system is first modeled, then simulated extensively on a large-scale asynchronous distributed simulator, and finally, the performance results are detailed.
Verlag: Springer New York, Springer US Apr 2002, 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 240 pp. Englisch.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Taschenbuch. Zustand: Neu. Principles of Secure Network Systems Design | Sumit Ghosh | Taschenbuch | xxvi | Englisch | 2012 | Springer New York | EAN 9781461265382 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.
Taschenbuch. Zustand: Neu. Guarding Your Business | A Management Approach to Security | Manu Malek (u. a.) | Taschenbuch | xiv | Englisch | 2013 | Springer US | EAN 9781475782127 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security What organizational structures, policies, and procedures must be in place What legal and privacy issues must be addressed.
Verlag: Springer New York, Springer US, 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.