Электронная библиотека

ЭЛЕКТРОННАЯ БИБЛИОТЕКА






Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

Computer Security. Principles and Practice

Компьютерные >> Сетевые технологии





Разместил: bennyblanko

22-07-2015, 16:49

Просмотров: 390





Computer Security. Principles and Practice
In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.

In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
It covers all security topics considered Core in the IEEE/ACM Computer Science Curriculum 2008: An Interim Revision to CS 2001. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.

Contents
Online Resources
Notation
About the Authors
Preface
Reader’s and Instructor’s Guide
Overview
Computer Security Technology and Principles
Cryptographic Tools
User Authentication
Access Control
Database Security
Malicious Software
Denial-of-Service Attacks
Intrusion Detection
Firewalls and Intrusion Prevention Systems
Software Security and Trusted Systems
Buffer Overflow
Software Security
Operating System Security
Trusted Computing and Multilevel Security
Management Issues
IT Security Management and Risk Assessment
IT Security Controls, Plans, and Procedures
Physical and Infrastructure Security
Human Resources Security
Security
Legal and Ethical Aspects
Cryptographic Algorithms
Symmetric Encryption and Message Confidentiality
Public-Key Cryptography and Message Authentication
Network Security
Internet Security Protocols and Standards
Internet Authentication Applications
Wireless Network Security
Appendices


Название: Computer Security. Principles and Practice
Авторы: Stallings W., Brown L.
Издательство: Pearson
Год выпуска: 2012
Формат: PDF
Страниц: 817
ISBN: 0132775069, 9780132775069
Язык: Английский
Размер: 13.6 Мб


СКАЧАТЬ | DOWNLOAD

turbobit.net
hitfile.net
dfiles.ru








Похожие публикации

Road Vehicle Dynamics: Fundamentals and Modeling Road Vehicle Dynamics: Fundamentals and Modeling
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it

Intrusion Detection in Wireless Ad-Hoc Networks Intrusion Detection in Wireless Ad-Hoc Networks
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it

Corporate Computer Security Corporate Computer Security
A strong business focus through a solid technical presentation of security tools. Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for

Encyclopedia of Cryptography and Security Encyclopedia of Cryptography and Security
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly

New Perspectives on Computer Concepts 2013: Comprehensive New Perspectives on Computer Concepts 2013: Comprehensive
This edition of New Perspectives on Computer Concepts 2013 goes beyond the computer basics and covers relevant technical and practical information that matter to students' daily lives. Every chapter of the book covers a specific subject in a

Computer and Information Security Handbook Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they

Information Security and Ethics: Concepts, Methodologies, Tools and Applications Information Security and Ethics: Concepts, Methodologies, Tools and Applications
Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Cyber security, encompassing both information and network security, is of utmost importance in today's information age.

Electronic Postage Systems: Technology, Security, Economics Electronic Postage Systems: Technology, Security, Economics
This book offers the first comprehensive overview of contemporary systems for secure electronic/digital postage

Securing Wireless Communications at the Physical Layer Securing Wireless Communications at the Physical Layer
The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods




Отзывы и Комментарии





Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent

Книги




Союз образовательных сайтов