Bringing together methods in pure mathematics, computer and telecommunication sciences, and social sciences, this book focuses on the security, privacy, and safety of information and communication technology. It begins with the basic components of hardware and algorithms, then covers integration and systems, and concludes with human factors in these systems. It discusses cryptography, hardware and software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management. Each chapter includes recommendations for further reading and websites that provide more in-depth information.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.