Microsoft Encyclopedia of Security
Seiten
2003
Microsoft Press,U.S. (Verlag)
978-0-7356-1877-0 (ISBN)
Microsoft Press,U.S. (Verlag)
978-0-7356-1877-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application—ready answers to help maximize security for your mission-critical systems and data.
Know your vulnerabilities—understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks.
Deploy your best defense—review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics.
Stay one step ahead—keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends.
Decipher security acronyms—from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.
Build your own network of resources—from professional associations and standards organizations to online communities and links to free information, know how to stay current.
Get an edge in certification preparation—ideal reference for anyone pursuing Security+, MCSE, CISSP, GIAC, and other professional certifications.
Entries include:
Advanced Encryption Standard
backdoors
CERT/CC
cookie poisoning
digital rights management
dynamic packet filtering
E-SIGN Act
file slack
hacking
honeypots
ICMP tunneling
IPSec
John the Ripper
keystroke logging
L2TP
L0phtCrack
managed security service providers
message digests
NIAP
Nmap
Qchain
one-time passwords
password cracking
PKI
port scanning
privacy
reverse Telnet
Safe Harbor Agreement
spoofing
Tcp_wrapper
Trin00
UDP scanning
viruses
wardriving
Windows cryptographic API
XML signatures
Web services security
worms
zombie zapper
and more
Know your vulnerabilities—understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks.
Deploy your best defense—review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics.
Stay one step ahead—keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends.
Decipher security acronyms—from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.
Build your own network of resources—from professional associations and standards organizations to online communities and links to free information, know how to stay current.
Get an edge in certification preparation—ideal reference for anyone pursuing Security+, MCSE, CISSP, GIAC, and other professional certifications.
Entries include:
Advanced Encryption Standard
backdoors
CERT/CC
cookie poisoning
digital rights management
dynamic packet filtering
E-SIGN Act
file slack
hacking
honeypots
ICMP tunneling
IPSec
John the Ripper
keystroke logging
L2TP
L0phtCrack
managed security service providers
message digests
NIAP
Nmap
Qchain
one-time passwords
password cracking
PKI
port scanning
privacy
reverse Telnet
Safe Harbor Agreement
spoofing
Tcp_wrapper
Trin00
UDP scanning
viruses
wardriving
Windows cryptographic API
XML signatures
Web services security
worms
zombie zapper
and more
Mitch Tulloch is a widely recognized expert on Windows administration and has been awarded Microsoft Most Valuable Professional (MVP) status for his contributions supporting those who deploy and use Microsoft platforms, products, and solutions.
An alphabetical reference of terms
Erscheint lt. Verlag | 18.6.2003 |
---|---|
Verlagsort | Redmond |
Sprache | englisch |
Maße | 187 x 229 mm |
Gewicht | 1000 g |
Themenwelt | Schulbuch / Wörterbuch ► Lexikon / Chroniken |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-7356-1877-1 / 0735618771 |
ISBN-13 | 978-0-7356-1877-0 / 9780735618770 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95