Sold Out
Book Categories |
Part I: Challenges and Basic Approaches: 1) Introduction - 2) Fundamental Challenges - 3) Computing Systems and their Basic Vulnerabilities.- Part II: Fundamentals of Information Flow and Inference Control - 4) Messages, Inferences, Information and Knowledge - 5) Preventive Inference Control.- Part III: Security Mechanisms.- 6) Key Ideas and Examples - 7) Combined Techniques - 8) Techniques of Control and Monitoring - 9) Conceptual Access Rights - 10) Elements of a Security Architecture - 11) Monitoring and Intrusion Detection - 12) Techniques of Cryptography - 13) Encryption - 14) Authentication - 15) Anonymization - 16) Some Further Cryptographic Prools.- Part IV: Implementations - 17) Design of Selected Systems.- Appendix, References, Index.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity in Computing Systems
X
This Item is in Your InventorySecurity in Computing Systems
X
You must be logged in to review the productsX
X
X
Add Security in Computing Systems, With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He ha, Security in Computing Systems to the inventory that you are selling on WonderClubX
X
Add Security in Computing Systems, With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He ha, Security in Computing Systems to your collection on WonderClub |