Computer Security Basics - Rick Lehtinen
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtreNouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 14 à 21 jours ouvrables.
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Computer Security Basics de Rick Lehtinen Format Broché - Livre
0 avis sur Computer Security Basics de Rick Lehtinen Format Broché - Livre
Donnez votre avis et cumulez 5
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Computer Security Basics de Rick Lehtinen Format Broché
- Livre
Résumé : This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
Topics include:
Biographie:
Chapter 1: Introduction Chapter 2: Some Security History
Computer Security Chapter 3: Computer System Security and Access Controls Chapter 4: Viruses and Other Wildlife Chapter 5: Establishing and Maintaining a Security Policy Chapter 6: Web Attacks and Internet Vulnerabilities Communications Security Chapter 7: Encryption Chapter 8: Communications and Network Security Other Types of Security Chapter 9: Physical Security and Biometrics Chapter 10: Wireless Network Security Appendixes OSI Model TEMPEST The Orange Book, FIPS PUBS, and the Common Criteria Colophon...
Sommaire:
Chapter 1: Introduction Chapter 2: Some Security History
Computer Security Chapter 3: Computer System Security and Access Controls Chapter 4: Viruses and Other Wildlife Chapter 5: Establishing and Maintaining a Security Policy Chapter 6: Web Attacks and Internet Vulnerabilities Communications Security Chapter 7: Encryption Chapter 8: Communications and Network Security Other Types of Security Chapter 9: Physical Security and Biometrics Chapter 10: Wireless Network Security Appendixes OSI Model TEMPEST The Orange Book, FIPS PUBS, and the Common Criteria Colophon...
Détails de conformité du produit
Personne responsable dans l'UE