登入
|
註冊
|
會員中心
|
結帳
|
培訓課程
魔法弟子
|
自資出版
|
電子書
|
客服中心
|
智慧型立体會員
書名
出版社
作者
isbn
編號
5050魔法眾籌
|
NG書城
|
國際級品牌課程
|
優惠通知
|
霹靂英雄音樂精選
|
!工作不卡,人生不苦的31個生存心法
此作者無相關書籍
文學小說
文學
|
小說
商管創投
財經投資
|
行銷企管
人文藝坊
宗教、哲學
社會、人文、史地
藝術、美學
|
電影戲劇
勵志養生
醫療、保健
料理、生活百科
教育、心理、勵志
進修學習
電腦與網路
|
語言工具
雜誌、期刊
|
軍政、法律
參考、考試、教科用書
科學工程
科學、自然
|
工業、工程
家庭親子
家庭、親子、人際
青少年、童書
玩樂天地
旅遊、地圖
|
休閒娛樂
漫畫、插圖
|
限制級
COMPUTER SECURITY: PRINCIPLES AND PRACTICE 3/E(GE)
作者:
STALLINGS
分類:
行銷企管
/
企管•資訊科技
出版社:
全華圖書
出版日期:2014/10/28
ISBN:9781292066172
書籍編號:kk0395764
頁數:840
定價:
1120
元
優惠價:
88
折
986
元
書價若有異動,以出版社實際定價為準
訂購後立即為您進貨
訂購後立即為您進貨:目前無庫存量,讀者下訂後,開始進入調書程序,一般天數約為2-10工作日(不含例假日)。
團購數最低為 20 本以上
評價數:
(請將滑鼠移至星星處進行評價)
目前平均評價:
文字連結
複製語法
COMPUTER SECURITY: PRINCIPLES AND PRACTICE 3/E(GE)
圖片連結
複製語法
分
享
內容簡介
作者介紹
書籍目錄
同類推薦
COMPUTER SECURITY: PRINCIPLES AND PRACTICE 3/E (GE) In recent years, the need for education in computer security and related topics has grown dramatically—and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. The Text and Academic Authors Association named Computer Security: Principles and Practice, First Edition, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008. Teaching and Learning Experience This program presents a better teaching and learning experience—for you and your students. It will help: 1.Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including both research and modeling projects in your course, giving students a broader perspective. 2.Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in computer security. 3.Enhance Learning with Engaging Features: Extensive use of case studies and examples provides real-world context to the text material. 4.Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.
STALLINGS
Ch0: Guide for Readers and Instructors Ch1: Overview PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Ch2: Cryptographic Tools Ch3: User Authentication Ch4: Access Control Ch5: Database and Cloud Security Ch6: Malicious Software Ch7: Denial-of-Service Attacks Ch8: Intrusion Detection Ch9: Firewalls and Intrusion Prevention Systems PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS Ch10: Buffer Overflow Ch11: Software Security Ch12: Operating System Security Ch13: Trusted Computing and Multilevel Security PART THREE MANAGEMENT ISSUES Ch14: IT Security Management and Risk Assessment Ch15: IT Security Controls, Plans and Procedures Ch16: Physical and Infrastructure Security Ch17: Human Resources Security Ch18: Security Auditing Ch19 : Legal and Ethical Aspects PART FOUR CRYPTOGRAPHIC ALGORITHMS Ch20: Symmetric Encryption and Message Confidentiality Ch21: Public-Key Cryptography and Message Authentication PART FIVE NETWORK SECURITY Ch22: Internet Security Protocols and Standards Ch23 : Internet Authentication Applications Ch24: Wireless Network Security APPENDICES Appendix A Projects and Other Student Exercises for Teaching Computer Security REFERENCES INDEX LIST OF ACRONYMS ONLINE CHAPTERS AND APPENDICES Online chapters, appendices, and other documents are Premium Content, available via the access card printed in the front of the book. Ch25: Linux Security Ch26: Windows and Windows Vista Security Appendix B Some Aspects of Number Theory Appendix C Standards and Standard-Setting Organizations Appendix D Random and Pseudorandom Number Generation Appendix E Message Authentication Codes Based on Block Ciphers Appendix F TCP/IP Protocol Architecture Appendix G Radix-64 Conversion Appendix H Security Policy-Related Documents Appendix I The Domain Name System Appendix J The Base-Rate Fallacy Appendix K SHA-3 Appendix L Glossary
責任型思維,從態度到
管理學(Jones/
利他一心
Fundamenta
資通安全法合規研究與
Fundamenta
作業管理(Jacob
星展銀行數位轉型實踐
管制圖與製程管制(十
實現對永續報導之有效
為了保障您的權益,新絲路網路書店所購買的商品均享有到貨七天的鑑賞期(含例假日)。退回之商品必須於鑑賞期內寄回(以郵戳或收執聯為憑),且商品必須是全新狀態與完整包裝(商品、附件、內外包裝、隨貨文件、贈品等),否則恕不接受退貨。