Computer Security HandbookSeymour Bosworth, M. E. Kabay John Wiley & Sons, 16/10/2002 - 1224 من الصفحات "Computer Security Handbook" - Jetzt erscheint der Klassiker in der 4. aktualisierten Auflage. Es ist das umfassendste Buch zum Thema Computersicherheit, das derzeit auf dem Markt ist. In 23 Kapiteln und 29 Anhängen werden alle Aspekte der Computersicherheit ausführlich behandelt. Die einzelnen Kapitel wurden jeweils von renommierten Experten der Branche verfasst. Übersichtlich aufgebaut, verständlich und anschaulich geschrieben. Das "Computer Security Handbook" wird in Fachkreisen bereits als DAS Nachschlagewerk zu Sicherheitsfragen gehandelt. |
من داخل الكتاب
النتائج 1-5 من 84
الصفحة iv
... copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc ...
... copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc ...
الصفحة 1-11
... copy and take away large amounts of data . Another important difference is the character of the connection between the com- puter and the terminals . Each dumb terminal has a dedicated connection to its main- frame and receives only ...
... copy and take away large amounts of data . Another important difference is the character of the connection between the com- puter and the terminals . Each dumb terminal has a dedicated connection to its main- frame and receives only ...
الصفحة 2-5
... copy- right on a work , the first step was to make sure that any published version of the work contained certain basic copyright information : the copyright symbol © , the name of the copyright holder , and the year of creation or ...
... copy- right on a work , the first step was to make sure that any published version of the work contained certain basic copyright information : the copyright symbol © , the name of the copyright holder , and the year of creation or ...
الصفحة 2-6
... copy machine owner about plans to make the illegal copy , and the owner knows or has reason to know the image does not belong to the copier , the photocopier owner has " contributed " to the infringement and has violated the copyright ...
... copy machine owner about plans to make the illegal copy , and the owner knows or has reason to know the image does not belong to the copier , the photocopier owner has " contributed " to the infringement and has violated the copyright ...
الصفحة 2-7
... copies of disks , diskettes , or tapes that contain software applications and providing them to users in violation of the agreement constitutes copy- right infringement in the clearest terms . Where such acts are done on the commer ...
... copies of disks , diskettes , or tapes that contain software applications and providing them to users in violation of the agreement constitutes copy- right infringement in the clearest terms . Where such acts are done on the commer ...
المحتوى
PART TWO THREATS AND VULNERABILITIES | 5-23 |
PART THREE PREVENTION TECHNICAL DEFENSES | 14-27 |
PART FOUR PREVENTION HUMAN FACTORS | 24-53 |
PART FIVE DETECTION | 34-65 |
PART SIX REMEDIATION | 39-13 |
PART SEVEN MANAGEMENTS ROLE | 43-33 |
PART EIGHT OTHER CONSIDERATIONS | 47-31 |
INDEX | 1-1 |
طبعات أخرى - عرض جميع المقتطفات
عبارات ومصطلحات مألوفة
access control access control lists ActiveX allow application attacks audit authentication behavior CCEVS certificate Chapter client Common Criteria communications computer crime Computer Security copy corporate cost criminal customers damage database DDoS Denial of Service detection digital signatures document e-commerce e-mail effective electronic employees encryption equipment ethical evaluation example files firewall functions hackers identify implemented incident information security information systems infrastructure installed internal Internet issues law enforcement loss ment monitor National operating system organization packets password percent person potential problem procedures protection protocol public key reported requirements response result risk rity rootkit scan scanners secu security policies server signature specific standard target testing threats tion trust unauthorized Unix Validation vendors victim virus viruses vulnerabilities Web server worm
مقاطع مشهورة
الصفحة 2-16 - The basic guidelines for the trier of fact must be: (a) whether "the average person, applying contemporary community standards...
الصفحة 12-11 - Collections of literary or artistic works such as encyclopaedias and anthologies which by reason of the selection and arrangement of their contents constitute intellectual creations...
الصفحة 18-48 - The effect of provisions of this Act may be varied by agreement, except as otherwise provided in this Act and except that the obligations of good faith, diligence, reasonableness and care prescribed by this Act may not be disclaimed by agreement but the parties may by agreement determine the standards by which the performance of such obligations is to be measured if such standards are not manifestly unreasonable. (4) The presence in certain provisions of this Act of the words "unless otherwise agreed...
الصفحة 7-6 - Information superiority is all about getting the right information to the right people at the right time in the right format while denying adversaries the same advantages.
الصفحة 7-12 - If two or more persons conspire either to commit any offense against the United States or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy, each shall be fined not more than $10,000 or imprisoned not more than five years, or both.
الصفحة 12-8 - The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention. The specification shall conclude with one or more claims particularly pointing out and distinctly claiming...
الصفحة 12-4 - derivative work" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a "derivative work".
الصفحة 12-4 - DERIVATIVE WORK" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation or any other form in which a work may be recast, transformed, or adapted.
الصفحة 12-10 - ... a manner contrary to honest commercial practices so long as such information: (a) is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question...
الصفحة 12-6 - ... effectively controls access to a work" if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.