32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
16 °P sammeln
  • Broschiertes Buch

Exploitation by attackers whose have breached the computer network security of some of the world's most venerable institutions and organization had become increased every year. Within this type of attention, computer network security has gone from the as an extra services to the main services in a relatively short period of a time. The main purpose is to mitigate security risk and assure that their digital assets are safe and secure. Then, digital environment is become a better condition to the every body especially for business activities. Vulnerability analysis activities can help to…mehr

Produktbeschreibung
Exploitation by attackers whose have breached the computer network security of some of the world's most venerable institutions and organization had become increased every year. Within this type of attention, computer network security has gone from the as an extra services to the main services in a relatively short period of a time. The main purpose is to mitigate security risk and assure that their digital assets are safe and secure. Then, digital environment is become a better condition to the every body especially for business activities. Vulnerability analysis activities can help to identify the weaknesses and vulnerabilities in the computer network system that assists IT person to prevent the attacks against it by the hackers or crackers.
Autorenporträt
Firkhan Ali B. Hamid Ali es profesor de TIC en la Facultad de Tecnología de la Información y Multimedia de la Universidad Tun Hussein Onn de Malasia. Ha publicado ampliamente en las áreas de redes informáticas, seguridad de la información y TI. También ha investigado, consultado y enseñado en los ámbitos de las TIC y la informática desde 1999.