Network Security for Government and Corporate Executives
Autor Andrew Abbate, Chris Amaris, Mark Weinhardt, Rand Morimotoen Limba Engleză Paperback – 15 sep 2025
Preț: 398.73 lei
Preț vechi: 458.30 lei
-13% Nou
Puncte Express: 598
Preț estimativ în valută:
76.33€ • 78.50$ • 63.33£
76.33€ • 78.50$ • 63.33£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780132414258
ISBN-10: 0132414252
Pagini: 320
Dimensiuni: 178 x 254 mm
Greutate: 1 kg
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Upper Saddle River, United States
ISBN-10: 0132414252
Pagini: 320
Dimensiuni: 178 x 254 mm
Greutate: 1 kg
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Upper Saddle River, United States
Cuprins
Chapter 1: The New Era of Cyber-Security and Cyber-Crime
Chapter 2: Security Attacks and Vulnerabilities
Chapter 3: Authentication and Access Control Security
Chapter 4: Technologies and Tools to Secure a Network Environment
Chapter 5: Developing and Implementing Security Policies
Chapter 6: Creating an Effective Security Management Team Structure
Chapter 7: Balancing the Need for Security with Constitutional Rights
Chapter 8: Crime, Punishment, and the U.S. Legal System Relative to Network Security
Chapter 9: Security Audits to Validate Security Strength and Assess Risk
Chapter 10: Business Continuity and Contingency Planning
Chapter 11: Monitoring and Maintaining Systems to Minimize the Risk of Attack
Chapter 12: Responding to Security Incidents and Attacks
Biographies
Chapter 2: Security Attacks and Vulnerabilities
Chapter 3: Authentication and Access Control Security
Chapter 4: Technologies and Tools to Secure a Network Environment
Chapter 5: Developing and Implementing Security Policies
Chapter 6: Creating an Effective Security Management Team Structure
Chapter 7: Balancing the Need for Security with Constitutional Rights
Chapter 8: Crime, Punishment, and the U.S. Legal System Relative to Network Security
Chapter 9: Security Audits to Validate Security Strength and Assess Risk
Chapter 10: Business Continuity and Contingency Planning
Chapter 11: Monitoring and Maintaining Systems to Minimize the Risk of Attack
Chapter 12: Responding to Security Incidents and Attacks
Biographies