Over 10 mio. titler Fri fragt ved køb over 499,- Hurtig levering Forlænget returret til 31/01/25

Network and System Security

Forfatter: info mangler
Bog
  • Format
  • Bog, paperback
  • Engelsk

Beskrivelse

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

Læs hele beskrivelsen
Detaljer
  • SprogEngelsk
  • Sidetal432
  • Udgivelsesdato08-10-2013
  • ISBN139780124166899
  • Forlag Syngress Media,u.S.
  • FormatPaperback
Størrelse og vægt
  • Vægt720 g
  • coffee cup img
    10 cm
    book img
    19,1 cm
    23,5 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    Sabotage Internet Linux Access UNIX Intranet TCP/IP Encryption Private Fraud Integrity Operating systems Frames Access control Radio frequency Computer security Crackers Theft Detection Errors Auditing Tunneling Remote access Confidentiality Directories Knowledge workers Social engineering Phishing ring Blogs Interfaces Policies Protocols Security Smartphones Social media Mesh Cloud computing hacker Public Groups Cybercrime Wireless ad-hoc networks Wireless Networks Kernel Wireless Network Security Cybersecurity Attack vectors Availability Users Cloud Security Bandwidth Daemons Intrusion detection systems File system Mobile devices Malware Cellular networks Radio-Frequency-Identification Data link layer Data storage Data sources Intrusion Free space optics Infrastructure Security Hybrid Physical attacks Local Area Networks System architecture Rootkit Incidents Point to Point Backups Cellular network security Back-end database Cloud layers Digital attacks Core Network Cross-network services Data rates Confirm primitive Electronic product code (EPC) tags Email based call forwarding service Closed nature Half-open scanning Directory paths Intrusion Prevention Systems Home Network legal risks Listen primitive Mashable applications File Names Fixed landline telephone network General risks Networking periphery hidden files Optical pulse-modulated signals Permissions Radio frequency identification applications Radio frequency identification tag Hard disk drives secure socket layer Send primitive Radio frequency identification reader Receive primitive Malicious Hackers Media Access Control Virtual private Vulnerability window Timestamp Status primitive omissions Network intrusions Optical wireless Radio frequency identification transponders Three-dimensional attack taxonomy Radio frequency identification standards Radio frequency identification transceiver Release primitive Wired Local Area Network Virtual private network Visiting network
    Machine Name: SAXO082