Cryptography and network security
With cyber-terrorism and corporate espionage, there is a need for trained network security professionals. This book describes the tools and penetration testing methodologies used by ethical hackers to understand how to protect computer networks. It discusses the ethical hacker, and how important the...
Đã lưu trong:
Tác giả chính: | |
---|---|
Tác giả khác: | |
Ngôn ngữ: | Undetermined English |
Được phát hành: |
Boston, Mass.
McGraw Hill
2008
|
Những chủ đề: | |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Trung tâm Học liệu Trường Đại học Trà Vinh |
---|
LEADER | 01410nam a2200265Ia 4500 | ||
---|---|---|---|
001 | TVU_18564 | ||
008 | 210423s9999 xx 000 0 und d | ||
020 | |a 0619217081 | ||
020 | |a 9780619217082 | ||
041 | |a eng | ||
082 | |a 5.8 | ||
082 | |b F434 | ||
100 | |a Simpson, Michael T. | ||
245 | 0 | |a Cryptography and network security | |
245 | 0 | |c Michael T. Simpson | |
260 | |a Boston, Mass. | ||
260 | |b McGraw Hill | ||
260 | |c 2008 | ||
300 | |a xxvi, 721 p. | ||
300 | |b ill. | ||
300 | |c 24 cm | ||
520 | |a With cyber-terrorism and corporate espionage, there is a need for trained network security professionals. This book describes the tools and penetration testing methodologies used by ethical hackers to understand how to protect computer networks. It discusses the ethical hacker, and how important they are in protecting from cyber attackon to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning | ||
650 | |a Hackers; Data encryption (Computer science); Computer security | ||
700 | |a Michael T. Simpson | ||
980 | |a Trung tâm Học liệu Trường Đại học Trà Vinh |