HjemGrupperSnakMereZeitgeist
Søg På Websted
På dette site bruger vi cookies til at levere vores ydelser, forbedre performance, til analyseformål, og (hvis brugeren ikke er logget ind) til reklamer. Ved at bruge LibraryThing anerkender du at have læst og forstået vores vilkår og betingelser inklusive vores politik for håndtering af brugeroplysninger. Din brug af dette site og dets ydelser er underlagt disse vilkår og betingelser.

Resultater fra Google Bøger

Klik på en miniature for at gå til Google Books

Indlæser...

Microsoft Encyclopedia of Security

af Mitch Tulloch

MedlemmerAnmeldelserPopularitetGennemsnitlig vurderingSamtaler
29Ingen813,239 (2)Ingen
Get the single resource that defines-and illustrates-the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues-including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application-ready answers to help maximize security for your mission-critical systems and data. * Know your vulnerabilities-understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks. * Deploy your best defense-review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics. * Stay one step ahead-keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends. * Decipher security acronyms-from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.* Build your own network of resources-from professional associations and standards organizations to online communities and links to free information, know how to stay current. * Get an edge in certification preparation-ideal reference for anyone pursuing Security+, MCSE, CISSP, GIAC, and other professional certifications. Entries include: * Advanced Encryption Standard * backdoors * CERT/CC * cookie poisoning * digital rights management * dynamic packet filtering * E-SIGN Act * file slack * hacking * honeypots * ICMP tunneling * IPSec * John the Ripper * keystroke logging * L2TP * L0phtCrack * managed security service providers * message digests * NIAP * Nmap * Qchain * one-time passwords * password cracking * PKI * port scanning * privacy * reverse Telnet * Safe Harbor Agreement * spoofing * Tcp_wrapper * Trin00 * UDP scanning * viruses * wardriving * Windows cryptographic API * XML signatures * Web services security * worms * zombie zapper * and more… (mere)
Ingen
Indlæser...

Bliv medlem af LibraryThing for at finde ud af, om du vil kunne lide denne bog.

Der er ingen diskussionstråde på Snak om denne bog.

Ingen anmeldelser
ingen anmeldelser | tilføj en anmeldelse
Du bliver nødt til at logge ind for at redigere data i Almen Viden.
For mere hjælp se Almen Viden hjælpesiden.
Kanonisk titel
Originaltitel
Alternative titler
Oprindelig udgivelsesdato
Personer/Figurer
Vigtige steder
Vigtige begivenheder
Beslægtede film
Indskrift
Tilegnelse
Første ord
Citater
Sidste ord
Oplysning om flertydighed
Forlagets redaktører
Bagsidecitater
Originalsprog
Canonical DDC/MDS
Canonical LCC

Henvisninger til dette værk andre steder.

Wikipedia på engelsk (1)

Get the single resource that defines-and illustrates-the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues-including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application-ready answers to help maximize security for your mission-critical systems and data. * Know your vulnerabilities-understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks. * Deploy your best defense-review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics. * Stay one step ahead-keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends. * Decipher security acronyms-from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.* Build your own network of resources-from professional associations and standards organizations to online communities and links to free information, know how to stay current. * Get an edge in certification preparation-ideal reference for anyone pursuing Security+, MCSE, CISSP, GIAC, and other professional certifications. Entries include: * Advanced Encryption Standard * backdoors * CERT/CC * cookie poisoning * digital rights management * dynamic packet filtering * E-SIGN Act * file slack * hacking * honeypots * ICMP tunneling * IPSec * John the Ripper * keystroke logging * L2TP * L0phtCrack * managed security service providers * message digests * NIAP * Nmap * Qchain * one-time passwords * password cracking * PKI * port scanning * privacy * reverse Telnet * Safe Harbor Agreement * spoofing * Tcp_wrapper * Trin00 * UDP scanning * viruses * wardriving * Windows cryptographic API * XML signatures * Web services security * worms * zombie zapper * and more

No library descriptions found.

Beskrivelse af bogen
Haiku-resume

Current Discussions

Ingen

Populære omslag

Ingen

Quick Links

Vurdering

Gennemsnit: (2)
0.5
1 1
1.5
2
2.5
3 1
3.5
4
4.5
5

Er det dig?

Bliv LibraryThing-forfatter.

 

Om | Kontakt | LibraryThing.com | Brugerbetingelser/Håndtering af brugeroplysninger | Hjælp/FAQs | Blog | Butik | APIs | TinyCat | Efterladte biblioteker | Tidlige Anmeldere | Almen Viden | 204,458,097 bøger! | Topbjælke: Altid synlig