Computer Security: Principles and Practice

Computer Security: Principles and Practice PDF Rezension

Ansichten:

805

Sprache:

Englisch

Bewertung:

0

Abteilung:

Technologie

Seitenzahl:

0

Abschnitt:

hacken

Benachrichtigung

Da die Website aktualisiert wird, wird der Download vorübergehend gestoppt, bis die Aktualisierung abgeschlossen ist [email protected]

Er unterhält eine Website mit dem Titel Computer Science Student Resource. Er hat 17 Titel und überarbeitete Ausgaben mitgezählt, insgesamt über 40 Bücher zu diesen Themen verfasst. Er war technischer Mitarbeiter, technischer Manager und leitender Angestellter bei mehreren High-Tech-Unternehmen. Er arbeitet als unabhängiger Berater, zu dessen Kunden Computer- und Netzwerkhersteller und -kunden, Softwareentwicklungsfirmen und führende staatliche Forschungseinrichtungen gehören

Beschreibung des Buches

Computer Security: Principles and Practice pdf Rezension von William Stallings

In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

Veröffentlichungsrechte vorbehalten

Das Buch ist bei YSK Books nicht verfügbar, um das Urheberrecht des Autors und des Verlags zu wahren.

Buchrezension

0

out of

5 stars

0

0

0

0

0

Book Quotes

Top rated
Latest
Quote
there are not any quotes

there are not any quotes

Mehr Bücher William Stallings

Computer Organization and Architecture
Computer Organization and Architecture
Hardware-
1347
English
William Stallings
Computer Organization and Architecture pdf von William Stallings
Cryptography and Network Security
Cryptography and Network Security
hacken
1407
English
William Stallings
Cryptography and Network Security pdf von William Stallings
Operating Systems
Operating Systems
Software
1050
English
William Stallings
Operating Systems pdf von William Stallings
Data and Computer Communications
Data and Computer Communications
Nachrichtentechnik
693
English
William Stallings
Data and Computer Communications pdf von William Stallings

Mehr Bücher hacken

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
2630
English
Kevin Mitnick
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers pdf von Kevin Mitnick
The art of deception: controlling the human element of security
The art of deception: controlling the human element of security
3027
English
Kevin Mitnick
The art of deception: controlling the human element of security pdf von Kevin Mitnick
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing
1936
English
Kevin Mitnick
No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing pdf von Kevin Mitnick
Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty
2564
English
Kevin Mitnick
Hardware Hacking: Have Fun While Voiding Your Warranty pdf von Kevin Mitnick

Add Comment

Authentication required

You must log in to post a comment.

Log in
There are no comments yet.