Practical Data Security
-10%
portes grátis
Practical Data Security
Applied Information Technology
Gordon, John
Taylor & Francis Ltd
06/2020
160
Mole
Inglês
9781138331044
15 a 20 dias
330
Descrição não disponível.
1. An Organisation for Security in a Major Company. Charles Brookson. 2. Information Technology Security Evaluation: Management Summary. Eric Roche. 3. Closing the Evaluation Gap - the CLEF Experience. Andrew Clark and Andrea Cumming. 4. Mechanisms of Stealth. Alan Solomon. 5. Computer Viruses. Jan Hruska. 6. Security Modelling. John Gordon. 7. Secure Delivery of Software. Fiona Williams and Samantha Green. 8. Digital Signatures for Non-Repudiation. Fred Piper. 9. Network Encryption Management. Vince Gallo. 10. Computer Crime: Law and Regulation - Protection and Prosecution. Wendy R. London. 11. A Structured Control Methodology to Aid Data Security. John Mitchell. 12. Securing Your PC. Alex Mcintosh.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
UK National Scheme;UK Statute;Anti-virus;Anti-virus Software;RSA Signature Scheme;Information Technology Security Evaluation Criteria;SOG;National Academy;Trusted Computer System Evaluation Criteria;Boot Sector Viruses;Business Processes;Law Commission;Boot Sector;Security Evaluation Criteria;Public Key;Secret Key;EXE Files;Vat Rate;Public Key System;Security Accreditation;Virus Authors;Certificate Number;Companion Viruses;Parasitic Viruses;Information Technology Security Evaluation
1. An Organisation for Security in a Major Company. Charles Brookson. 2. Information Technology Security Evaluation: Management Summary. Eric Roche. 3. Closing the Evaluation Gap - the CLEF Experience. Andrew Clark and Andrea Cumming. 4. Mechanisms of Stealth. Alan Solomon. 5. Computer Viruses. Jan Hruska. 6. Security Modelling. John Gordon. 7. Secure Delivery of Software. Fiona Williams and Samantha Green. 8. Digital Signatures for Non-Repudiation. Fred Piper. 9. Network Encryption Management. Vince Gallo. 10. Computer Crime: Law and Regulation - Protection and Prosecution. Wendy R. London. 11. A Structured Control Methodology to Aid Data Security. John Mitchell. 12. Securing Your PC. Alex Mcintosh.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
UK National Scheme;UK Statute;Anti-virus;Anti-virus Software;RSA Signature Scheme;Information Technology Security Evaluation Criteria;SOG;National Academy;Trusted Computer System Evaluation Criteria;Boot Sector Viruses;Business Processes;Law Commission;Boot Sector;Security Evaluation Criteria;Public Key;Secret Key;EXE Files;Vat Rate;Public Key System;Security Accreditation;Virus Authors;Certificate Number;Companion Viruses;Parasitic Viruses;Information Technology Security Evaluation