The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hossein Bidgoli, Ph.D., is professor Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States. he is the author of 43 textbooks, 27 manuals and over five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor -in-chief of the Internet Encyclopedia and the Encyclopedia of Information Systems. The Encyclopedia of Information Systems. The Encyclopedia of Information Systems was the recipient of one of the Library Journal's Best Reference Sources for 2002 and The Internet Encyclopedia was recipient of one of the PSP Awards (Professional and Scholarly Publishing), 2004. Dr. Bidgoli was selected as the California State University, Bakersfield's 2001-2002 Professor of the Year.
Inhaltsangabe
VOLUME I: KEY CONCEPTS INFRASTRUCTURE STANDARDS AND PROTOCOLS. Part 1: Key Concepts and Applications related to Information Security. Part 2: Infrastructure for the Internet Computer Networks and Secure Information Transfer. Part 3: Standards and Protocols for Secure Information Transfer. VOLUME II: INFORMATION WARFARE; SOCIAL LEGAL AND INTERNATIONAL ISSUES; AND SECURITY FOUNDATIONS. Part 1: Information Warfare. Part 2: Social and Legal Issues. Part 3: Foundations of Information Computer and Network Security. VOLUME III: THREATS VULNERABILITIES PREVENTION DETECTION AND MANAGEMENT. Part 1: Threats Vulnerabilities Prevention Detection and Management. Part 2: Prevention: Keeping the Hackers and Crackers at Bay. Part 3: Detection Recovery Management and Policy Considerations.
VOLUME I: KEY CONCEPTS INFRASTRUCTURE STANDARDS AND PROTOCOLS. Part 1: Key Concepts and Applications related to Information Security. Part 2: Infrastructure for the Internet Computer Networks and Secure Information Transfer. Part 3: Standards and Protocols for Secure Information Transfer. VOLUME II: INFORMATION WARFARE; SOCIAL LEGAL AND INTERNATIONAL ISSUES; AND SECURITY FOUNDATIONS. Part 1: Information Warfare. Part 2: Social and Legal Issues. Part 3: Foundations of Information Computer and Network Security. VOLUME III: THREATS VULNERABILITIES PREVENTION DETECTION AND MANAGEMENT. Part 1: Threats Vulnerabilities Prevention Detection and Management. Part 2: Prevention: Keeping the Hackers and Crackers at Bay. Part 3: Detection Recovery Management and Policy Considerations.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497