Introduction to Information System Swcurity(Chinese Edition)
5 Angebote vergleichen

Preise201320142015
Schnitt 66,79 74,71 68,94
Nachfrage
Bester Preis: 46,03 (vom 27.10.2013)
1
FANG YONG

Introduction to Information System Swcurity(Chinese Edition)

Lieferung erfolgt aus/von: China, Volksrepublik NW

ISBN: 9787505385924 bzw. 7505385925, Sprache unbekannt, neu.

47,35 ($ 61,69)¹ + Versand: 13,82 ($ 18,00)¹ = 61,17 ($ 79,69)¹
unverbindlich
Lieferung aus: China, Volksrepublik, Versandkosten nach: DEU.
Von Händler/Antiquariat, cninternationalseller.
paperback. New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback Pages Number: 426 Language: Simplified Chinese Publisher: Publishing House of Electronics Industry; 1 (April 1. 2003). Introduction to Information Systems Security from the security system. security services. security mechanisms and security management about all areas in the basic theory and methods of information system security. with emphasis given basic theoretical background knowledge of information systems security. information system security architecture. the OSI security framework and mechanism. system security and basic Knowledge. Intrusion attacks. firewall. intrusion detection and monitoring. physical isolation and anti-virus technology in detail. and gives a part of the specific use of the program. Information Systems Security Introduction to institutions of higher learning information management and information systems. computer. communications. information security professional undergraduate and graduate teaching characteristics. a greater emphasis on combining theory and engineering applications. so that it can be used as information Management and Information Systems undergraduate textbook materials. but also as an information security professional undergraduate. but also for engaging in relevant professional teaching. research and engineering and technical personnel reference. Contents: Chapter 1 Introduction 1.1 Information System Overview 1.1.1 Definition of Information Systems 1.1.2 Information systems development process 1.2 Information System Security 1.2.1 Basic concepts 1.2.2 the confidentiality of information and information systems security 1.3 affect the security of information systems factors 1.3.1 Information Systems Security Vulnerability 1.3.2 the basic principles of information systems security threat 1.4 Information Systems Security Defense Strategy 1.4.1 defense strategy 1.4.2 security of information systems engineering principles 1.4.3 Typical information systems security needs analysis 1.5 Information Systems Security elements 1.5.1 The information system security objectives 1.5.2 Information Systems Security elements of 1.6 information system security classification guidelines 1.6.1 The first level of user protection 1.6.2 The second-level system 1.6.3 The third security token protection level 1.6.4 level structure of protection level of audit protection level 1.6.5 fifth grade visit to verify the protection level Summary thinking title of Chapter 2 Information Systems Security System 2.1 the iso OSI Security Architecture 2.1.1 security system. security services 2.1.2 security system security mechanisms 2.2 tcpip security system internet network architecture 2.2.1 2.2.2 internet security architecture 2.2.3 Network Layer Security Protocol ipsec2.2.4 Transport Layer Security safety management of the agreement tls2.3 and opening up the system interconnect 2.3.1 the concept of safety management 2.3.2 Summary think the question of the safety management of the main contents of this chapter Chapter 3. security services and features to configure 3.1 Overview 3.2 confidentiality protection 3.2.1 the basic concepts of 3.2 3.2.4 the confidentiality of service in the the .2 confidential service and the threats to 3.2.3 confidentiality policy expression and facilities 3.3 access control services 3.3.1 Access Control service functions 3.3.2 access control component distribution and threats 3.3 .3 access control policy and to achieve 3.3.4 access control information (aci3.3.5 access control facilities 3.4 Authentication Service 3.4.1 3.4.2 identify the basic concepts of information 3.4.3 3.4.4 Human user authentication to identify stage 3.4.5 letter of third parties to participate in 3.4.6 to identify services and facilities 3.4.7 to identify attacks and countermeasures 3.5 anti-repudiation services 3.5.1 Basic concept 3.5.2 The primary anti-denial and to submit anti-denial of service 3.5.3 of the trusted third party role 3.5.4 of the five stages of anti-denial of service 3.5.5 3.5.6 Non-repudiation service information and facilities 3.6 integrity protection 3.6.1 the basic concepts of 3.6.2 on the integrity of the threats and attacks 3.6.3 The integrity of the anti-denial strategy 3.6.4 The integrity of information and facilities 3.7 Safety Audit and Alarm 3.7.1 Basic concepts 3.7.2 security audit and alarms strategy and 3.7.3 security auditing and alerting services and facilities Summary think the question strategy and the strategy of expression 4 Principles of Information Security Technology 4.1 cryptographic techniques 4.1.1 Overview 4.1.2 password Principle 4.1.3 cryptographic algorithms 4.1.4 key and key management framework 4.1.5 Key Management 4.2.1 Overview of the program 4.2 access control technology 4.2.2 Access Control principle 4.2.3 4.2.4 network access control components of the distribution of interaction with the other security services and security technology 4.2.5 4.2.6 Communications management of access control information access control and routing control 4.3 confidentiality protection technology 4.3.1 Overview 4.3.2 confidentiality protection technology 4.3.3 Key Management 4.4 integrity protection 4.4.1 Overview 4.4.2 The integrity of the mechanism of the classification description 4.4.3 and other security services and security technology interaction 4.4. four communication protocol requirements 4.4.5 The integrity of the architecture 4.5 identification techniques 4.5.1 Overview 4.5.2 identification of principle 4.5.3 and other security services and security technology. interactive 4.5.4 non-password authentication mechanism 4.5.5 primary identify 4.5.7 Design authentication protocol should pay attention to needs and identification of problem 4.5.8 communication protocol architecture 4.6 digital signature technology based on password authentication mechanism 4.5.6 Data 4.6.1 Overview 4.6.2 with Appendix technology 4.6.3 signatures with message recovery digital signature technology 4.7 anti-repudiation technology 4.7.1 Overview principle 4.7.3 4.7.2 Non-repudiation Non-repudiation technology threats to 4.7.4 and other security components and security technology interaction 4.7.5 communication protocol needs 4.8 security audit and alarm mechanisms 4.8.1 general concept 4.8.2 security 4.10 universal security alarm reporting features 4.8.3 Security audit trail function 4.8.4 to interact with other security components and security technologies 4.9 notarization technology Technical Summary practical thinking title of Chapter 5. information security technology 5.1 Overview 5.2 basic types of firewall technology 5.2.1 Basic concepts 5.2.2 firewall 5.2.4 Firewall 5.2.3 firewall architectures and their configuration in the form of limitations 5.2.5 firewall application example 5.3 5.3.1 Basic concepts of intrusion detection and warning technology 5.3.2 5.3.5 Intrusion Detection tcpip protocol security flaws network attack 5.3.4 5.3.3 typical process of network intrusion intrusion detection system. the basic principles of basic method 5.3.6 5.3.7 intrusion detection to achieve a number of issues to consider 5.4 Leak Detection 5.4.1 invasion type of attack can take advantage of system vulnerabilities 5.4.2 Leak Detection 5.4.3 vulnerability detection technology classification of intrusion detection system structure characteristics 5.4.4 vulnerability detection system design example 5.5 network isolation technology 5.5.1 Overview 5.5.2 network isolation technology 5.5.3 Network Isolation typical program 5.6 computer virus prevention 5.6.1 malicious programs 5.6.2 characteristics of the virus 5.6.3 the type of virus 5.6.4 virus infection 5.6.5 Anti-Virus Technical Overview 5.6.6 the new trends of computer viruses Summary think chapter 6 of title the first public key infrastructure 6.1 Overview 6.1.1 pki definition 6.1 constitute 6.4 .2 X.509 certificates and certificate revocation list 6.2 pki services provided 6.3 pki pki Standard 6.4.1 and the the pki definition of the relevant standard 6.4.2 the pki applications standard 6.5 pki trust models 6.5.1 ca running the model in the strict hierarchy 6.5.2 ca distributed trust structure 6.5.4 6.5.3 ca web model ca user-centric trust model 6.5.5 Cross-Certification 6.6 pki 6.7 foreign the pki system development status 6.7.1 Reference of the U.S. federal the pki system structure 6.7.2 Canada two systems of government the pki system structure 6.7.3 Summary think the question in English acronyms English Chinese table Satisfaction guaranteed,or money back.
2
FANG YONG

Introduction to Information System Swcurity

Lieferung erfolgt aus/von: Deutschland PB NW

ISBN: 9787505385924 bzw. 7505385925, Sprache unbekannt, Taschenbuch, neu.

46,03 + Versand: 11,59 = 57,62
unverbindlich
Von Händler/Antiquariat, liu xing [54261761], JiangSu, JS, China.
Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback Pages Number: 426 Language: Simplified Chinese Publisher: Publishing House of Electronics Industry; 1 (April 1. 2003). Introduction to Information Systems Security from the security system. security services. security mechanisms and security management about all areas in the basic theory and methods of information system security. with emphasis given basic theoretical background knowledge of information systems security. information system security architecture. the OSI security framework and mechanism. system security and basic Knowledge. Intrusion attacks. firewall. intrusion detection and monitoring. physical isolation and anti-virus technology in detail. and gives a part of the specific use of the program. Information Systems Security Introduction to institutions of higher learning information management and information systems. computer. communications. information security professional undergraduate and graduate teaching characteristics. a greater emphasis on combining theory and engineering applications. so that it can be used as information Management and Information Systems undergraduate textbook materials. but also as an information security professional undergraduate. but also for engaging in relevant professional teaching. research and engineering and technical personnel reference. Contents: Chapter 1 Introduction 1.1 Information System Overview 1.1.1 Definition of Information Systems 1.1.2 Information systems development process 1.2 Information System Security 1.2.1 Basic concepts 1.2.2 the confidentiality of information and information systems security 1.3 affect the security of information systems factors 1.3.1 Information Systems Security Vulnerability 1.3.2 the basic principles of information systems security threat 1.4 Information Systems Security Defense Strategy 1.4.1 defense strategy 1.4.2 security of information systems engineering principles 1.4.3 Typical information systems security needs analysis 1.5 Information Systems Security elements 1.5.1 The information system security objectives 1.5.2 Information Systems Security elements of 1.6 information system security classification guidelines 1.6.1 The first level of user protection 1.6.2 The second-level system 1.6.3 The third security token protection level 1.6.4 level structure of protection level of audit protection level 1.6.5 fifth grade visit to verify the protection level Summary thinking title of Chapter 2 Information Systems Security System 2.1 the iso OSI Security Architecture 2.1.1 security system. security services 2.1.2 security system security mechanisms 2.2 tcpip security system internet network architecture 2.2.1 2.2.2 internet security architecture 2.2.3 Network Layer Security Protocol ipsec2.2.4 Transport Layer Security safety management of the agreement tls2.3 and opening up the system interconnect 2.3.1 the concept of safety management 2.3.2 Summary think the question of the safety management of the main contents of this chapter Chapter 3. security services and features to configure 3.1 Overview 3.2 confidentiality protection 3.2.1 the basic concepts of 3.2 3.2.4 the confidentiality of service in the the .2 confidential service and the threats to 3.2.3 confidentiality policy expression and facilities 3.3 access control services 3.3.1 Access Control service functions 3.3.2 access control component distribution and threats 3.3 .3 access control policy and to achieve 3.3.4 access control information (aci3.3.5 access control facilities 3.4 Authentication Service 3.4.1 3.4.2 identify the basic concepts of information 3.4.3 3.4.4 Human user authentication to identify stage 3.4.5 letter of third parties to participate in 3.4.6 to identify services and facilities 3.4.7 to identify attacks and countermeasures 3.5 anti-repudiation services 3.5.1 Basic concept 3.5.2 The primary anti-denial and to submit anti-denial of service 3.5.3 of.
3
FANG YONG

Introduction to Information System Swcurity(Chinese Edition) (2000)

Lieferung erfolgt aus/von: Vereinigtes Königreich Großbritannien und Nordirland PB US

ISBN: 9787505385924 bzw. 7505385925, Sprache unbekannt, Electronics Industry Press; 1 edition (April 1. 2003), Taschenbuch, gebraucht.

107,37 (£ 91,69)¹
unverbindlich
Lieferung aus: Vereinigtes Königreich Großbritannien und Nordirland, Usually dispatched within 1-2 business days.
Von Händler/Antiquariat, ChineseBooks.
Die Beschreibung dieses Angebotes ist von geringer Qualität oder in einer Fremdsprache. Trotzdem anzeigen
4
FANG YONG

Introduction to Information System Swcurity(Chinese Edition) (2000)

Lieferung erfolgt aus/von: Vereinigte Staaten von Amerika PB US

ISBN: 9787505385924 bzw. 7505385925, Sprache unbekannt, Electronics Industry Press; 1 edition (April 1. 2003), Taschenbuch, gebraucht.

66,40 ($ 91,69)¹ + Versand: 2,89 ($ 3,99)¹ = 69,29 ($ 95,68)¹
unverbindlich
Lieferung aus: Vereinigte Staaten von Amerika, Usually ships in 1-2 business days.
Von Händler/Antiquariat, LoveChinaBook.
Die Beschreibung dieses Angebotes ist von geringer Qualität oder in einer Fremdsprache. Trotzdem anzeigen
5
FANG YONG

Introduction to Information System Swcurity(Chinese Edition)

Lieferung erfolgt aus/von: Deutschland PB NW

ISBN: 9787505385924 bzw. 7505385925, Sprache unbekannt, Taschenbuch, neu.

56,63 + Versand: 8,91 = 65,54
unverbindlich
Von Händler/Antiquariat, liu xing [54261761], JiangSu, JS, China.
Die Beschreibung dieses Angebotes ist von geringer Qualität oder in einer Fremdsprache. Trotzdem anzeigen
Lade…