Computer Security HandbookSeymour Bosworth, M. E. Kabay John Wiley & Sons, 16/10/2002 - 1224 من الصفحات "Computer Security Handbook" - Jetzt erscheint der Klassiker in der 4. aktualisierten Auflage. Es ist das umfassendste Buch zum Thema Computersicherheit, das derzeit auf dem Markt ist. In 23 Kapiteln und 29 Anhängen werden alle Aspekte der Computersicherheit ausführlich behandelt. Die einzelnen Kapitel wurden jeweils von renommierten Experten der Branche verfasst. Übersichtlich aufgebaut, verständlich und anschaulich geschrieben. Das "Computer Security Handbook" wird in Fachkreisen bereits als DAS Nachschlagewerk zu Sicherheitsfragen gehandelt. |
من داخل الكتاب
النتائج 1-5 من 81
الصفحة vii
... Electronics Corporation, manufacturers of precision electronic instruments and digital devices; and president of Alpha Data Processing Corporation, a general-purpose computer service bureau. As a vice president at Bankers Trust company ...
... Electronics Corporation, manufacturers of precision electronic instruments and digital devices; and president of Alpha Data Processing Corporation, a general-purpose computer service bureau. As a vice president at Bankers Trust company ...
الصفحة vii
... Electronics Corporation, manufacturers of precision electronic instruments and digital devices; and president of Alpha Data Processing Corporation, a general-purpose computer service bureau. As a vice president at Bankers Trust company ...
... Electronics Corporation, manufacturers of precision electronic instruments and digital devices; and president of Alpha Data Processing Corporation, a general-purpose computer service bureau. As a vice president at Bankers Trust company ...
الصفحة xii
... Electronic Frontier Award from the Electronic Frontier Foundation for his groundbreaking work in analyzing content-blocking software. Robert Gezelter, CDP (e-mail: gezelter@rlgsc.com) has over 27 years of experi- ence in computing ...
... Electronic Frontier Award from the Electronic Frontier Foundation for his groundbreaking work in analyzing content-blocking software. Robert Gezelter, CDP (e-mail: gezelter@rlgsc.com) has over 27 years of experi- ence in computing ...
الصفحة xvii
... Electronic Commerce, Privacy, Information Security, and Technology Licensing/Joint Ventures/ Strategic Alliances. Ritter is recognized as pioneer in defining the emerging law of electronic commerce. He was the founding chair of the ...
... Electronic Commerce, Privacy, Information Security, and Technology Licensing/Joint Ventures/ Strategic Alliances. Ritter is recognized as pioneer in defining the emerging law of electronic commerce. He was the founding chair of the ...
الصفحة 2-4
... electronic communicators and others who want to be able to negotiate and close deals using electronic, as opposed to written, communication. While negotiation over the Internet certainly has been possible, many deals have had to be ...
... electronic communicators and others who want to be able to negotiate and close deals using electronic, as opposed to written, communication. While negotiation over the Internet certainly has been possible, many deals have had to be ...
المحتوى
PART TWO THREATS AND VULNERABILITIES | 5-23 |
PART THREE PREVENTION TECHNICAL DEFENSES | 14-27 |
PART FOUR PREVENTION HUMAN FACTORS | 24-53 |
PART FIVE DETECTION | 34-65 |
PART SIX REMEDIATION | 39-13 |
PART SEVEN MANAGEMENTS ROLE | 43-33 |
PART EIGHT OTHER CONSIDERATIONS | 47-31 |
INDEX | 1-1 |
طبعات أخرى - عرض جميع المقتطفات
عبارات ومصطلحات مألوفة
access control access control lists ActiveX allow application attacks audit authentication behavior CCEVS certificate Chapter client Common Criteria communications computer crime Computer Security copy corporate cost criminal customers damage database DDoS Denial of Service detection digital signatures document e-commerce e-mail effective electronic employees encryption equipment ethical evaluation example files firewall functions hackers identify implemented incident information security information systems infrastructure installed internal Internet issues law enforcement loss ment monitor National operating system organization packets password percent person potential problem procedures protection protocol public key reported requirements response result risk rity rootkit scan scanners secu security policies server signature specific standard target testing threats tion trust unauthorized Unix Validation vendors victim virus viruses vulnerabilities Web server worm
مقاطع مشهورة
الصفحة 2-16 - The basic guidelines for the trier of fact must be: (a) whether "the average person, applying contemporary community standards...
الصفحة 12-11 - Collections of literary or artistic works such as encyclopaedias and anthologies which by reason of the selection and arrangement of their contents constitute intellectual creations...
الصفحة 18-48 - The effect of provisions of this Act may be varied by agreement, except as otherwise provided in this Act and except that the obligations of good faith, diligence, reasonableness and care prescribed by this Act may not be disclaimed by agreement but the parties may by agreement determine the standards by which the performance of such obligations is to be measured if such standards are not manifestly unreasonable. (4) The presence in certain provisions of this Act of the words "unless otherwise agreed...
الصفحة 7-6 - Information superiority is all about getting the right information to the right people at the right time in the right format while denying adversaries the same advantages.
الصفحة 7-12 - If two or more persons conspire either to commit any offense against the United States or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy, each shall be fined not more than $10,000 or imprisoned not more than five years, or both.
الصفحة 12-8 - The specification shall contain a written description of the invention, and of the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which it pertains, or with which it is most nearly connected, to make and use the same, and shall set forth the best mode contemplated by the inventor of carrying out his invention. The specification shall conclude with one or more claims particularly pointing out and distinctly claiming...
الصفحة 12-4 - derivative work" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a "derivative work".
الصفحة 12-4 - DERIVATIVE WORK" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation or any other form in which a work may be recast, transformed, or adapted.
الصفحة 12-10 - ... a manner contrary to honest commercial practices so long as such information: (a) is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question...
الصفحة 12-6 - ... effectively controls access to a work" if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.