77,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

A dictionary and handbook that defines the field and provides unique insight
Turn to Minoli-Cordovana's Authoritative Computer and Network Security Dictionary for clear, concise, and up-to-date definitions of terms, concepts, methods, solutions, and tools in the field of computer and network security. About 5,555 security- and IT-related words and phrases are defined. Drawing their definitions from their work experience and from a variety of established and respected sources, the authors have created a single, up-to-the-minute, and standardized resource that users can trust for accuracy and…mehr

Produktbeschreibung
A dictionary and handbook that defines the field and provides unique insight

Turn to Minoli-Cordovana's Authoritative Computer and Network Security Dictionary for clear, concise, and up-to-date definitions of terms, concepts, methods, solutions, and tools in the field of computer and network security. About 5,555 security- and IT-related words and phrases are defined. Drawing their definitions from their work experience and from a variety of established and respected sources, the authors have created a single, up-to-the-minute, and standardized resource that users can trust for accuracy and authority.

The dictionary is written for industry executives, managers, and planners who are charged with the responsibility of protecting their organizations from random, negligent, or planned attacks on their information technology resources. It not only defines terms, but also provides these professionals with critical insight into the terms' use and applicability in thefield of IT security. Users can therefore refer to the dictionary as a handbook and guide to provide direction and support in all critical areas of computer and network security.

Using a holistic approach, the dictionary takes a broad view of computer and network security, providing users with a single source that defines the complete field, including:
_ Definitions targeting the many resources that need to be protected, such as hosts, systems, OSs, databases, storage, information, communications links, communications network elements, clients, PCs, PDAs, VoIP devices, wireless access points and devices, Bluetooth systems, digital content, e-mail, and more
_ Definitions for a core set of general IT and networking topics and terms, focusing on recent threats such as worms, viruses, trojans, physical security, internally based attacks, and social engineering
_ Definitions for financial topics and terms that are connected to IT security issues, to support the business case for strong security mechanisms at the firm

With the worldwide financial impact of malicious code estimated at roughly 100 billion dollars a year and the threat of ever-increasing vulnerabilities, this dictionary provides essential support to help identify and reduce security risks and protect network and computer users from hostile applicationsand viruses.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
DANIEL MINOLI has worked and published extensively in the field of IT security, with more than thirty years of hands-on experience in IT, telecommunications, wireless, and networking. He has helped develop systems and solutions for such organizations as Advanced Research Projects Agency (ARPA), Bell Telephone Laboratories, ITT, Prudential Securities, Telcordia (Bell Communications Research), AT&T, Leading Edge Networks, Capital One Financial, New York University, Rutgers University, Stevens Institute of Technology, and Société Générale de Financement du Québec. His columns have been published in Computerworld, Network World, and Network Computing. JAMES CORDOVANA has a decade of experience as an information technology and security professional, deploying advanced information security architectures for numerous applications, systems, and networks. For the past several years, Mr. Cordovana has held the position of Security Architect, taking part in the evolution of the information security posture of a Fortune 200 company.
Rezensionen
"...this book is mostly for managers and professionals who need a clue about a particular term or acronym..." (Computing Reviews.com, January 19, 2007)
"Although this book is written for industry executives, managers, and planners, students in computer science or information science programs will find it a valuable resource. At the current price, it is an excellent buy." (CHOICE, March 2007)

"...well researched and unique. It is recommended for technical and business reference collections." (American Reference Books Annual, March 2007)

"...this book is mostly for managers and professionals who need a clue about a particular term or acronym..." (Computing Reviews.com, January 19, 2007)