Commputer and Information Security Handbook /

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offerin...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Vacca, John R.
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: Cambridge : Elsevier, 2017
Phiên bản:Third edition
Những chủ đề:
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường CĐ Kỹ Thuật Cao Thắng
LEADER 02145nam a2200253 a 4500
001 TVCDKTCT111649
003 TVCĐKTCT
005 20200624101523.000
008 200618syyyy vn
980 \ \ |a Thư viện Trường CĐ Kỹ Thuật Cao Thắng 
024 |a RG_1 #1 eb0 i1 
020 # # |a 978-0-12-8303843-7  
041 0 # |a eng 
082 # # |a 005.8   |b C429M 
100 1 # |a Vacca, John R.  
245 1 0 |a Commputer and Information Security Handbook /   |c John R. Vacca 
250 # # |a Third edition 
260 # # |a Cambridge :   |b Elsevier,   |c 2017 
300 |a 1237tr. ;   |c 27cm 
520 # # |a Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. 
541 # # |a Tặng 
650 # 4 |a Computer and Information 
721 # # |a Công nghệ thông tin 
841 # # |b Kho Sách   |j 100053318, 100053379, 100053385