Information Security
Strategies for Understanding and Reducing Risks
Seiten
2007
John Wiley & Sons Ltd (Verlag)
978-0-470-85905-6 (ISBN)
John Wiley & Sons Ltd (Verlag)
978-0-470-85905-6 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
At last, Gattiker has provided the book that every IT security person should own to do their job! In short, a book that teaches you all you need to know about security and explains WHY certain issues are important. * Unique approach treats the network as a whole 'living' entity (sick system vs.
At last, Gattiker has provided the book that every IT security person should own to do their job! In short, a book that teaches you all you need to know about security and explains WHY certain issues are important. Unique approach treats the network as a whole 'living' entity (sick system vs. healthy system) Comprehensive overview of concepts, methods and theories of information security, including wireless networks. Complete and easy--to--read explanation of common strategy and tools. Uses and defines consistent terminology. Emphasis on concepts that are explained with the help of examples to link theory with practice. Gives advice on the necessary human, technical and financial resources for critical IT infrastructures. Especially useful for readers in applied fields such as systems design, security auditing, vulnerability testing, and role--based access management.
At last, Gattiker has provided the book that every IT security person should own to do their job! In short, a book that teaches you all you need to know about security and explains WHY certain issues are important. Unique approach treats the network as a whole 'living' entity (sick system vs. healthy system) Comprehensive overview of concepts, methods and theories of information security, including wireless networks. Complete and easy--to--read explanation of common strategy and tools. Uses and defines consistent terminology. Emphasis on concepts that are explained with the help of examples to link theory with practice. Gives advice on the necessary human, technical and financial resources for critical IT infrastructures. Especially useful for readers in applied fields such as systems design, security auditing, vulnerability testing, and role--based access management.
Erscheint lt. Verlag | 30.3.2007 |
---|---|
Verlagsort | Chichester |
Sprache | englisch |
Maße | 168 x 244 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Technik ► Elektrotechnik / Energietechnik | |
ISBN-10 | 0-470-85905-9 / 0470859059 |
ISBN-13 | 978-0-470-85905-6 / 9780470859056 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95