Sold Out
Book Categories |
VOLUME I: KEY CONCEPTS, INFRASTRUCTURE, STANDARDS, AND PROTOCOLS.
Part 1: Key Concepts and Applications related to Information Security.
Part 2: Infrastructure for the Internet, Computer Networks, and Secure Information Transfer.
Part 3: Standards and Protocols for Secure Information Transfer.
VOLUME II: INFORMATION WARFARE; SOCIAL, LEGAL, AND INTERNATIONAL ISSUES; AND SECURITY FOUNDATIONS.
Part 1: Information Warfare.
Part 2: Social and Legal Issues.
Part 3: Foundations of Information, Computer and Network Security.
VOLUME III: THREATS, VULNERABILITIES, PREVENTION, DETECTION, AND MANAGEMENT.
Part 1: Threats, Vulnerabilities, Prevention, Detection, and Management.
Part 2: Prevention: Keeping the Hackers and Crackers at Bay.
Part 3: Detection, Recovery, Management, and Policy Considerations.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionHandbook of information security
X
This Item is in Your InventoryHandbook of information security
X
You must be logged in to review the productsX
X
X
Add Handbook of information security, The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, , Handbook of information security to the inventory that you are selling on WonderClubX
X
Add Handbook of information security, The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, , Handbook of information security to your collection on WonderClub |