A Dictionary of Information Security Terms, Abbreviations and Acronyms
Seiten
2007
IT Governance Publishing (Verlag)
978-1-905356-16-4 (ISBN)
IT Governance Publishing (Verlag)
978-1-905356-16-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Designed to help a manager or someone new to the subject identify the meaning of a particular term, this is a dictionary of information security and related terms.
This Dictionary is an invaluable resource for people grappling with security terminology for the first time. Rather than a dry technical dictionary, the book is written in an accessible style that enables managers and novices to quickly grasp the meaning of information security terms. Example definitions: 'Bluesnarfing an attack on a Bluetooth enabled device that allows download of all contact details along with other information without leaving any trace of the attack.' 'Digital certificate (sometimes called a Server ID) is an encrypted file that attests to the authenticity of the owner of a public key, used in public key encryption; the certificate is created by a trusted third party known as a certificate authority (CA). The digital certificate is proven to be authentic because it decrypts correctly using the public key of the CA.' 'Pharming Criminal activity resulting in users being redirected from entered, correct website address to a fake website.'
This Dictionary is an invaluable resource for people grappling with security terminology for the first time. Rather than a dry technical dictionary, the book is written in an accessible style that enables managers and novices to quickly grasp the meaning of information security terms. Example definitions: 'Bluesnarfing an attack on a Bluetooth enabled device that allows download of all contact details along with other information without leaving any trace of the attack.' 'Digital certificate (sometimes called a Server ID) is an encrypted file that attests to the authenticity of the owner of a public key, used in public key encryption; the certificate is created by a trusted third party known as a certificate authority (CA). The digital certificate is proven to be authentic because it decrypts correctly using the public key of the CA.' 'Pharming Criminal activity resulting in users being redirected from entered, correct website address to a fake website.'
Erscheint lt. Verlag | 1.3.2007 |
---|---|
Reihe/Serie | Pocket Guides: Practical Information Security ; v. 2 |
Verlagsort | Ely |
Sprache | englisch |
Maße | 95 x 165 mm |
Themenwelt | Schulbuch / Wörterbuch ► Lexikon / Chroniken |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-905356-16-1 / 1905356161 |
ISBN-13 | 978-1-905356-16-4 / 9781905356164 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95