Search preferences
Direkt zu den wichtigsten Suchergebnissen

Suchfilter

Produktart

  • Alle Product Types 
  • Bücher (5)
  • Magazine & Zeitschriften (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Comics (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Noten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Kunst, Grafik & Poster (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Fotografien (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Karten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Manuskripte & Papierantiquitäten (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)

Zustand Mehr dazu

Einband

Weitere Eigenschaften

  • Erstausgabe (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Signiert (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Schutzumschlag (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)
  • Angebotsfoto (2)

Sprache (2)

Preis

Benutzerdefinierte Preisspanne (EUR)

Gratisversand

  • Kostenloser Versand nach USA (Keine weiteren Ergebnisse entsprechen dieser Verfeinerung)

Land des Verkäufers

  • National Aeronautics and Space Administration

    Verlag: National Aeronautics and Space Administration, Washington DC, 1980

    Anbieter: Ground Zero Books, Ltd., Silver Spring, MD, USA

    Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 15,65

    EUR 4,34 Versand
    Versand innerhalb von USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Stapled in upper left corner. Zustand: Good. Xerox copy of Draft Instruction. 5, [1] pages. The Information Resources Management Division was the responsible Office in NASA for this instruction. This was intended to replace NASA Management Instruction, NMI 2410.7, Assuring Security and Integrity of NASA Data Processing, July 13, 1979. From the internet version 7C establishes policy and responsibilities for ensuring appropriate levels of security and integrity for NASA automated information processing installations, systems, data, and related resources; and constitutes the NASA Automated Information Security (AIS) Program. [Additional NASA policy can be found in the NASA On-Line Directives Information System (NODIS) Library . This site provides quick access to all of NASA's Policy Directives (NPD's) {i.e., formerly NASA Management Instructions (NMI's)}, NASA's Procedures & Guidelines (NPG's) {i.e., formerly NASA Handbooks (NHB's)} and NASA's Policy Charters (NPC's).] This instruction, when finalized, would apply to NASA Headquarters and field installations. It included all unclassified automated information systems and information resources used to support the management and technical activities of NASA, contractor, or research facility. Information resources not under NASA management cognizance, the utilization of which was incidental to services provided to NASA, were not generally included. NASA center could elect, on an individual basis, to include information resources exempted by this definition. Telecommunications security policy was the responsibility of the Office of Space Tracing and Data Systems and was not addressed.

  • Al-Shaer, Ehab/Ou, Xinming/Xie, Geoffrey (Hrsg.)

    Sprache: Englisch

    Verlag: Cham, Springer International Publishing., 2013

    ISBN 10: 3319014323 ISBN 13: 9783319014326

    Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland

    Verbandsmitglied: GIAQ ILAB VDA

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 13,00

    EUR 30,00 Versand
    Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    2013. 16 x 24 cm. VIII, 187 S. VIII, 187 p. 62 illus. Hardcover. Sprache: Englisch.

  • Ehab Al-Shaer

    Sprache: Englisch

    Verlag: Springer International Publishing, Springer International Publishing, 2013

    ISBN 10: 3319014323 ISBN 13: 9783319014326

    Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 53,49

    EUR 62,33 Versand
    Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

  • Ehab Al-Shaer

    Sprache: Englisch

    Verlag: Springer International Publishing, Springer International Publishing Okt 2013, 2013

    ISBN 10: 3319014323 ISBN 13: 9783319014326

    Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    EUR 53,49

    EUR 60,00 Versand
    Versand von Deutschland nach USA

    Anzahl: 2 verfügbar

    In den Warenkorb

    Buch. Zustand: Neu. Neuware -In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 196 pp. Englisch.

  • Unbekannt

    Sprache: Englisch

    Verlag: Palgrave Macmillan, 2013

    ISBN 10: 3319014323 ISBN 13: 9783319014326

    Anbieter: Buchpark, Trebbin, Deutschland

    Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

    Verkäufer kontaktieren

    Sonderangebot

    EUR 11,93

    EUR 105,00 Versand
    Versand von Deutschland nach USA

    Anzahl: 1 verfügbar

    In den Warenkorb

    Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.