Электронная библиотека

ЭЛЕКТРОННАЯ БИБЛИОТЕКА






Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

Corporate Computer Security

Компьютерные >> Сетевые технологии





Разместил: bennyblanko

21-07-2015, 10:32

Просмотров: 262





Corporate Computer Security
A strong business focus through a solid technical presentation of security tools.
Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace.
This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.

Contents
Preface
About the Authors
The Threat Environment
Planning and Policy
Cryptography
Secure Networks
Access Control
Firewalls
Host Hardening
Application Security
Data Protection
Incident and Disaster Response
Networking Concepts
Glossary
Index


Название: Corporate Computer Security
Авторы: Boyle R., Panko R.
Издательство: Prentice Hall
Год выпуска: 2012
Формат: PDF
Страниц: 689
Язык: Английский
Размер: 14.00 Мб


СКАЧАТЬ | DOWNLOAD

turbobit.net
hitfile.net
dfiles.ru








Похожие публикации

Computer Security. Principles and Practice Computer Security. Principles and Practice
In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated,

CISSP Training Kit CISSP Training Kit
Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your

Fundamentals of Information Systems Security Fundamentals of Information Systems Security
Part of the New Jones & Bartlett Learning Information Systems Security & Assurance Series! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in

Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions
Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out

Practical Hadoop Security Practical Hadoop Security
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan

New Perspectives on Computer Concepts 2013: Comprehensive New Perspectives on Computer Concepts 2013: Comprehensive
This edition of New Perspectives on Computer Concepts 2013 goes beyond the computer basics and covers relevant technical and practical information that matter to students' daily lives. Every chapter of the book covers a specific subject in a

Computer and Information Security Handbook Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they

Homeland Security and Emergency Medical Response Homeland Security and Emergency Medical Response
Homeland Security and Emergency Response is a first edition product for Higher Education. The book and its ancillaries are being developed and designed to meet the needs of a 15 hour course by the same name. It focuses on providing information on

Information Security and Ethics: Concepts, Methodologies, Tools and Applications Information Security and Ethics: Concepts, Methodologies, Tools and Applications
Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Cyber security, encompassing both information and network security, is of utmost importance in today's information age.




Отзывы и Комментарии





Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent

Книги




Союз образовательных сайтов