Купить бумажную книгу и читать
По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".
Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.
Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.
Автор: Mitch Tulloch
Жанр: Computing & Internet
Год: 2008
Язык: English
Размер:7.36 Мб
О книге:
The essential security reference for computer professionals at all levels.
Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application—ready answers to help maximize security for your mission-critical systems and data.
•Know your vulnerabilities—understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks.
•Deploy your best defense—review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics.
•Stay one step ahead—keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends.
•Decipher security acronyms—from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.
•Build your own network of resources—from professional associations and standards organizations to online communities and links to free information, know how to stay current.
•Get an edge in certification preparation—ideal reference for anyone pursuing Security+, MCSE, CISSP, GIAC, and other professional certifications.
ntries include:
Advanced Encryption Standard • backdoors • CERT/CC • cookie poisoning • digital rights management • dynamic packet filtering • E-SIGN Act • file slack • hacking • honeypots • ICMP tunneling • IPSec • John the Ripper • keystroke logging • L2TP • L0phtCrack • managed security service providers • message digests • NIAP • Nmap • Qchain • one-time passwords • password cracking • PKI • port scanning • privacy • reverse Telnet • Safe Harbor Agreement • spoofing • Tcp_wrapper • Trin00 • UDP scanning • viruses • wardriving • Windows® cryptographic API • XML signatures • Web services security • worms • zombie zapper • and more
Купить бумажную книгу или электронную версию книги и скачать
По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".
Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.
Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.
Дата создания страницы: