Handbook of Information Security, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations

Handbook of Information Security, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 407,25 €

Jetzt 326,99 €* E-Book

Artikel-Nr:
9780470051207
Veröffentl:
2006
Einband:
E-Book
Seiten:
1008
Autor:
Hossein Bidgoli
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
VOLUME I: KEY CONCEPTS, INFRASTRUCTURE, STANDARDS, AND PROTOCOLS.Part 1: Key Concepts and Applications related to InformationSecurity.Part 2: Infrastructure for the Internet, Computer Networks, andSecure Information Transfer.Part 3: Standards and Protocols for Secure InformationTransfer.VOLUME II: INFORMATION WARFARE; SOCIAL, LEGAL, AND INTERNATIONALISSUES; AND SECURITY FOUNDATIONS.Part 1: Information Warfare.Part 2: Social and Legal Issues.Part 3: Foundations of Information, Computer and NetworkSecurity.VOLUME III: THREATS, VULNERABILITIES, PREVENTION, DETECTION, ANDMANAGEMENT.Part 1: Threats, Vulnerabilities, Prevention, Detection, andManagement.Part 2: Prevention: Keeping the Hackers and Crackers at Bay.Part 3: Detection, Recovery, Management, and PolicyConsiderations.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.