Página inicialGruposDiscussãoExplorarZeitgeist
Pesquise No Site
Ja deu uma olhada em SantaThing, a tradição de oferta de prendas do LibraryThing?
dispensar
Este site usa cookies para fornecer nossos serviços, melhorar o desempenho, para análises e (se não estiver conectado) para publicidade. Ao usar o LibraryThing, você reconhece que leu e entendeu nossos Termos de Serviço e Política de Privacidade . Seu uso do site e dos serviços está sujeito a essas políticas e termos.
Hide this

Resultados do Google Livros

Clique em uma foto para ir ao Google Livros

Security in Computing (3rd Edition) de…
Carregando...

Security in Computing (3rd Edition) (edição: 2002)

de Charles P. Pfleeger (Autor)

MembrosResenhasPopularidadeAvaliação médiaConversas
1481147,782 (3.95)Nenhum(a)
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today's newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You'll start by mastering the field's basic terms, principles, and concepts. Next, you'll apply these basics in diverse situations and environments, learning to "think like an attacker" and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you'll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user--web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare-recent attacks and emerging risks Security flaws and risks associated with electronic voting systems  … (mais)
Membro:ChrisLanc
Título:Security in Computing (3rd Edition)
Autores:Charles P. Pfleeger (Autor)
Informação:Prentice Hall PTR (2002), Edition: 3, 746 pages
Coleções:Sua biblioteca
Avaliação:
Etiquetas:Nenhum(a)

Work Information

Security in Computing, 4th Edition de Charles P. Pfleeger

Nenhum(a)
Carregando...

Registre-se no LibraryThing tpara descobrir se gostará deste livro.

Ainda não há conversas na Discussão sobre este livro.

What are common web application functions?
Shopping- Amazon
Social-Facebook
Banking-Citibank
Auctions-eBay
Gambling-betfair
Web logs-blogger
Web mail-Gmail
Interactive information-Wikipedia ( )
Esta crítica foi marcada por vários usuários como um abuso ods termos de uso e não será mais exibida (exibir).
  nuttybookblogr1 | Dec 10, 2017 |
sem resenhas | adicionar uma resenha
Você deve entrar para editar os dados de Conhecimento Comum.
Para mais ajuda veja a página de ajuda do Conhecimento Compartilhado.
Título canônico
Título original
Títulos alternativos
Data da publicação original
Pessoas/Personagens
Lugares importantes
Eventos importantes
Filmes relacionados
Premiações
Epígrafe
Dedicatória
Primeiras palavras
Citações
Últimas palavras
Aviso de desambiguação
Editores da Publicação
Autores Resenhistas (normalmente na contracapa do livro)
Idioma original
CDD/MDS canônico
Canonical LCC

Referências a esta obra em recursos externos.

Wikipédia em inglês (3)

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today's newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You'll start by mastering the field's basic terms, principles, and concepts. Next, you'll apply these basics in diverse situations and environments, learning to "think like an attacker" and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you'll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user--web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare-recent attacks and emerging risks Security flaws and risks associated with electronic voting systems  

Não foram encontradas descrições de bibliotecas.

Descrição do livro
Resumo em haiku

Capas populares

Links rápidos

Avaliação

Média: (3.95)
0.5
1 1
1.5
2
2.5
3 2
3.5
4 2
4.5 1
5 4

É você?

Torne-se um autor do LibraryThing.

 

Sobre | Contato | LibraryThing.com | Privacidade/Termos | Ajuda/Perguntas Frequentes | Blog | Loja | APIs | TinyCat | Bibliotecas Históricas | Os primeiros revisores | Conhecimento Comum | 164,323,901 livros! | Barra superior: Sempre visível