IT Security for Homeland Security Specialists
Autor John Rayen Limba Engleză Paperback – 14 sep 2025
Preț: 398.72 lei
Preț vechi: 458.29 lei
-13% Nou
Puncte Express: 598
Preț estimativ în valută:
76.31€ • 79.54$ • 63.53£
76.31€ • 79.54$ • 63.53£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780132331128
ISBN-10: 0132331128
Pagini: 576
Dimensiuni: 178 x 254 mm
Greutate: 1 kg
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Upper Saddle River, United States
ISBN-10: 0132331128
Pagini: 576
Dimensiuni: 178 x 254 mm
Greutate: 1 kg
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Upper Saddle River, United States
Cuprins
Information Technology Security for Homeland Security Specialists I
Chapter 1: Introduction to Security
Chapter 2: Security Measures and Attack Methods
Chapter 3: Attack Classes
Chapter 4: Responding to Security Threats
Chapter 5: Legal Responses to Security Challenges
Chapter 6: Defining Your Policy
Chapter 7: Managing Risk
Chapter 8: Implementing the Security Process
Chapter 9: Best Practices
Appendices
Information Technology Security for Homeland Security Specialists II
Chapter 1: Practical Security Review
Chapter 2: Network Infrastructure
Chapter 3: Virtual Private Networks
Chapter 4: eCommerce Security
Chapter 5: Encryption
Chapter 6: The Hacker Approach
Chapter 7: Intrusion Detection
Chapter 8: Unix Security Basics
Chapter 9: NT Security Basics
Chapter 10: Windows 2000 Security Basics
Chapter 11: Unix vs. Windows
Biographies
Chapter 1: Introduction to Security
Chapter 2: Security Measures and Attack Methods
Chapter 3: Attack Classes
Chapter 4: Responding to Security Threats
Chapter 5: Legal Responses to Security Challenges
Chapter 6: Defining Your Policy
Chapter 7: Managing Risk
Chapter 8: Implementing the Security Process
Chapter 9: Best Practices
Appendices
Information Technology Security for Homeland Security Specialists II
Chapter 1: Practical Security Review
Chapter 2: Network Infrastructure
Chapter 3: Virtual Private Networks
Chapter 4: eCommerce Security
Chapter 5: Encryption
Chapter 6: The Hacker Approach
Chapter 7: Intrusion Detection
Chapter 8: Unix Security Basics
Chapter 9: NT Security Basics
Chapter 10: Windows 2000 Security Basics
Chapter 11: Unix vs. Windows
Biographies