intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Computer and information security handbook

Xem 1-10 trên 10 kết quả Computer and information security handbook
  • Part 1 book "Information security management handbook" includes content: Access control systems and methodology; telecommunications, network, and internet security; information security management.

    pdf1619p haojiubujain09 21-11-2023 6 4   Download

  • Part 1 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: introduction to security; history of computer security; key principles and practices; information systems management; application security; malicious software and anti-virus software;...

    pdf183p tieulangtran 28-09-2023 5 3   Download

  • Continued part 1, part 2 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: network security; understanding networks and network security; intrusion detection and prevention systems; virtual private networks; physical security; physical security and biometrics; current trends in information security;...

    pdf193p tieulangtran 28-09-2023 3 3   Download

  • Ebook Computer and information security handbook part 2 includes contents: Part IV privacy and access management, part V storage security, part VI physical security, part VII advanced security, part VIII appendices.

    pdf378p haojiubujain06 05-09-2023 5 3   Download

  • Ebook Computer and information security handbook part 1 includes contents: Part I overview of system and network security: a comprehensive introduction, part II managing information security, part III encryption technology.

    pdf499p haojiubujain06 05-09-2023 4 2   Download

  • Ebook Computer security handbook (4th edition) Part 1 includes contents: Part one foundations of computer security, part two threats and vulnerabilities, part three prevention: technical defenses. Please refer to the documentation for more details.

    pdf625p haojiubujain06 05-09-2023 5 3   Download

  • Ebook Information security management handbook (Sixth edition, Volume 6): Part 2 include of the following content: Domain 6 security architecture and design: principles of computer and network organizations, architectures, and designs; domain 7 operations security: operations controls; domain 8 business continuity and disaster recovery planning; domain 9 legal, regulations, compliance, and investigations: major categories of computer crime; domain 10 physical (environmental) security: elements of physical security.

    pdf231p runthenight03 07-12-2022 14 6   Download

  • is a lead network engineer for the University of Kentucky, where he works with healthcare networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. David has a Bachelor of Science degree and Master of Science degree in electrical engineering from the University of Kentucky. He is the author of several Cisco Press titles, including Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition; Cisco Firewall Video Mentor; and Cisco LAN Switching Video Mentor.

    pdf511p muathu_102 28-01-2013 85 16   Download

  • ...Information Security FUNDAMENTALS Copyright 2005 by CRC Press, LLC. All Rights Reserved. .OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Asset Protection and Security Management Handbook POA Publishing ISBN: 0-8493-1603-0 Building a Global Information Assurance Program Raymond J. Curts and Douglas E. Campbell ISBN: 0-8493-1368-6 Building an Information Security Awareness Program Mark B. Desman ISBN: 0-8493-0116-5 Critical Incident Management Alan B.

    pdf262p bookstore_1 10-01-2013 95 8   Download

  • One of the lessons I learned early in life is to never confess the stupid things that I have done in public—unless there’s a good punch line at the end of the story. Well, there is really no punch line at the end of the story I am about to tell you, but I am going to tell it anyway, because it helps introduce some of the key issues and concepts involved when securing e-mail clients and servers.

    pdf511p mylinh 11-08-2009 275 83   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2