SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Security in Computing

Security in Computing, 5. udgave

Security in Computing Vital Source e-bog

Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
(2015)
Pearson International
387,00 kr.
Leveres umiddelbart efter køb
Security in Computing, 5. udgave

Security in Computing Vital Source e-bog

Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
(2015)
Pearson International
455,00 kr.
Leveres umiddelbart efter køb
Security in Computing, 5. udgave

Security in Computing Vital Source e-bog

Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
(2015)
Pearson International
319,00 kr.
Leveres umiddelbart efter køb
Security in Computing, 5. udgave

Security in Computing Vital Source e-bog

Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
(2015)
Pearson International
691,00 kr. 621,90 kr.
Leveres umiddelbart efter køb
Security in Computing, 5. udgave

Security in Computing

Charles Pfleeger, Shari Pfleeger og Jonathan Margulies
(2015)
Sprog: Engelsk
Pearson Education, Limited
777,00 kr. 699,30 kr.
På lager, Bestil nu og få den leveret
om ca. 2 hverdage
  • Klik for at bedømme:
  • 6.0/6 (1 bedømmelse)
Denne bog erstatter Security in Computing

Detaljer om varen

  • 5. Udgave
  • Vital Source 180 day rentals (dynamic pages)
  • Udgiver: Pearson International (Januar 2015)
  • Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
  • ISBN: 9780134085050R180
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems  
Licens varighed:
Online udgaven er tilgængelig: 180 dage fra købsdato.
Offline udgaven er tilgængelig: 180 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 5. Udgave
  • Vital Source 365 day rentals (dynamic pages)
  • Udgiver: Pearson International (Januar 2015)
  • Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
  • ISBN: 9780134085050R365
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems  
Licens varighed:
Online udgaven er tilgængelig: 365 dage fra købsdato.
Offline udgaven er tilgængelig: 365 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 5. Udgave
  • Vital Source leje e-bog 90 dage
  • Udgiver: Pearson International (Januar 2015)
  • Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
  • ISBN: 9780134085050R90
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems  
Licens varighed:
Online udgaven er tilgængelig: 90 dage fra købsdato.
Offline udgaven er tilgængelig: 90 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 5. Udgave
  • Vital Source E-book (Dynamic pages)
  • Udgiver: Pearson International (Januar 2015)
  • Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
  • ISBN: 9780134085050
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems  
Licens varighed:
Online udgaven er tilgængelig: 365 dage fra købsdato.
Offline udgaven er tilgængelig: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 5. Udgave
  • Hardback: 944 sider
  • Udgiver: Pearson Education, Limited (Februar 2015)
  • Forfattere: Charles Pfleeger, Shari Pfleeger og Jonathan Margulies
  • ISBN: 9780134085043

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare

 

Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today's newest technologies, attacks, standards, and trends.

 

Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.

 

Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.

 

You'll start by mastering the field's basic terms, principles, and concepts. Next, you'll apply these basics in diverse situations and environments, learning to "think like an attacker" and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you'll go beyond technology to understand crucial management issues in protecting infrastructure and data.

 

New coverage includes

  • A full chapter on securing cloud environments and managing their unique risks
  • Extensive new coverage of security issues associated with user--web interaction
  • New risks and techniques for safeguarding the Internet of Things
  • A new primer on threats to privacy and how to guard it
  • An assessment of computers and cyberwarfare-recent attacks and emerging risks
  • Security flaws and risks associated with electronic voting systems

 


Chapter 1: Introduction
Chapter 2: Toolbox: Authentication, Access Control, and Cryptography
Chapter 3: Programs and Programming
Chapter 4: The Web--User Side
Chapter 5: Operating Systems
Chapter 6: Networks
Chapter 7: Databases
Chapter 8: Cloud Computing
Chapter 9: Privacy
Chapter 10: Management and Incidents
Chapter 11: Legal Issues and Ethics
Chapter 12: Details of Cryptography
Chapter 13: Emerging Topics Bibliography
Index
De oplyste priser er inkl. moms

Kunder der købte denne bog købte også en af disse:

miniaturebillede af omslaget til ISO27001/ISO27002 - A Pocket Guide, 2. udgave

ISO27001/ISO27002

A Pocket Guide
Alan Calder og IT Governance Publishing Staff
BCS Learning & Development Limited (2013)
162,00 kr.
Denne bog er lige nu i restordre hos udgiveren. Vi har p.t. ingen oplysninger om hvornår eller om den igen vil kunne leveres
miniaturebillede af omslaget til Search Methodologies - Introductory Tutorials in Optimization and Decision Support Techniques, 2. udgave

Search Methodologies

Introductory Tutorials in Optimization and Decision Support Techniques
Edmund K. Burke og Graham Kendall
Springer (2016)
899,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 15 hverdage
miniaturebillede af omslaget til Principles of Program Analysis

Principles of Program Analysis

Flemming Nielson, Hanne R. Nielson og Chris Hankin
Springer Berlin / Heidelberg (2004)
699,00 kr. 629,10 kr.
På lager, Bestil nu og få den leveret
om ca. 2 hverdage
miniaturebillede af omslaget til Design of Modern Heuristics - Principles and Application

Design of Modern Heuristics

Principles and Application
Franz Rothlauf
Springer Berlin / Heidelberg (2013)
731,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 15 hverdage

Senest sete

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Ebog: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 365 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.