Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Why Do I Need Security? Understanding Requirements and Risk. Security Policies and Procedures. Cryptography and Encryption. Authentication. Network Architecture and Physical Security. Firewalls and Perimeter Security. Network Management and Device Security. Wireless Network Security. Intrusion Detection. Remote Access. Host Security. Server Security. Client Security. Application Development. Security Maintenance and Monitoring. Vulnerability Testing. Security Audits. Incident Response. Integrating People, Process, and Technology. Trends to Watch.
Why Do I Need Security? Understanding Requirements and Risk. Security Policies and Procedures. Cryptography and Encryption. Authentication. Network Architecture and Physical Security. Firewalls and Perimeter Security. Network Management and Device Security. Wireless Network Security. Intrusion Detection. Remote Access. Host Security. Server Security. Client Security. Application Development. Security Maintenance and Monitoring. Vulnerability Testing. Security Audits. Incident Response. Integrating People, Process, and Technology. Trends to Watch.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497