第 1/2 張圖片


圖片庫
第 1/2 張圖片


有類似物品要出售?
Introduction to Security and Network Forensics by Buchanan, William J. Hardback
US $17.45
大約HK$ 135.75
或講價
狀況:
良好
曾被閱讀過的書籍,但狀況良好。封面有諸如磨痕等在內的極少損壞,但沒有穿孔或破損。精裝本書籍可能沒有書皮。封皮稍有磨損。絕大多數書頁未受損,存在極少的褶皺和破損。使用鉛筆標注文字處極少,未對文字標記,無留白處書寫文字。沒有缺頁。
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
運送:
免費 USPS Media MailTM.
所在地:Chicago, Illinois, 美國
送達日期:
估計於 10月3日 (星期五)至 10月10日 (星期五)之間送達 運送地點 94104
退貨:
不可退貨.
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
物品細節
- 物品狀況
- Artist
- Buchanan, William J.
- Brand
- N/A
- EAN
- 9780849335686
- ISBN
- 084933568X
- Release Title
- Introduction to Security and Network Forensics
- Book Title
- Introduction to Security and Network Forensics
- Colour
- N/A
關於產品
Product Identifiers
Publisher
Auerbach Publishers, Incorporated
ISBN-10
084933568X
ISBN-13
9780849335686
eBay Product ID (ePID)
9038712944
Product Key Features
Number of Pages
502 Pages
Publication Name
Introduction to Security and Network Forensics
Language
English
Publication Year
2011
Subject
Networking / General, Security / General, Forensic Science, Information Technology
Type
Textbook
Subject Area
Law, Computers
Format
Hardcover
Dimensions
Item Height
1.1 in
Item Weight
36.6 Oz
Item Length
10.2 in
Item Width
7.3 in
Additional Product Features
Intended Audience
College Audience
LCCN
2011-022164
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction to Security. Intrusion Detection Systems. Encryption. Authentication, Hashing, and Digital Certificates. Enhanced Software Security. Network Security Elements. Introduction to Risk. Threat Analysis. Network Forensics. Data Hiding and Obfuscation. Web Infrastructures. Cloud/Grid Computing.
Synopsis
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics. Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including: More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements 60,000 test questions, including for Certified Ethical Hacking and CISSP® 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labs Rounding out coverage with a look into more advanced topics, including data hiding, obfuscation, web infrastructures, and cloud and grid computing, this book provides the fundamental understanding in computer security and digital forensics required to develop and implement effective safeguards against ever-evolving cyber security threats. Along with this, the text includes a range of online lectures and related material, available at: http://asecuritybook.com., Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics. Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including: More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements 60,000 test questions, including for Certified Ethical Hacking and CISSP(R) 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labs Rounding out coverage with a look into more advanced topics, including data hiding, obfuscation, web infrastructures, and cloud and grid computing, this book provides the fundamental understanding in computer security and digital forensics required to develop and implement effective safeguards against ever-evolving cyber security threats. Along with this, the text includes a range of online lectures and related material, available at: http: //asecuritybook.com., Explaining the fundamentals of cyber security and digital forensics, this text covers the basic principles of intrusion detection systems, encryption, and authentication. Beginning with an overview of general concepts in security, it addresses hashing and digital certificates, enhanced software security, and network security. It introduces the concept of risk, threat analysis, and network forensics and covers data hiding, obfuscation, web infrastructures, and cloud and grid computing. Simulators, test questions, labs, and online lectures and related material are made available on the book's website.
LC Classification Number
TK5105.59
賣家提供的物品說明
賣家信用評價 (1,666)
- Automatische feedback van eBay- 買家留下的信用評價。過去 1 個月Bestelling voltooid - getrackt en op tijd
- Automatische feedback van eBay- 買家留下的信用評價。過去 1 個月Bestelling voltooid - getrackt en op tijd
- Automatische feedback van eBay- 買家留下的信用評價。過去 1 個月Bestelling voltooid - getrackt en op tijd