Principles of Secure Network Systems Design
Sumit Ghosh
Verkauft von buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
AbeBooks-Verkäufer seit 23. Januar 2017
Neu - Softcover
Zustand: Neu
Anzahl: 1 verfügbar
In den Warenkorb legenVerkauft von buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
AbeBooks-Verkäufer seit 23. Januar 2017
Zustand: Neu
Anzahl: 1 verfügbar
In den Warenkorb legenThis item is printed on demand - Print on Demand Titel. Neuware -As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 240 pp. Englisch.
Bestandsnummer des Verkäufers 9781461265382
From the reviews:
¿Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ¿¿ACM COMPUTER REVIEWS
"Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ... this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ... ." (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Widerrufsbelehrung/ Muster-Widerrufsformular/
Allgemeine Geschäftsbedingungen und Kundeninformationen/ Datenschutzerklärung
Widerrufsrecht für Verbraucher
(Verbraucher ist jede natürliche Person, die ein Rechtsgeschäft zu Zwecken abschließt, die überwiegend weder ihrer gewerblichen noch ihrer selbstständigen beruflichen Tätigkeit zugerechnet werden kann.)
Widerrufsbelehrung
Widerrufsrecht
Sie haben das Recht, binnen vierzehn Tagen ohne Angabe von Gründen diesen Vertrag zu widerrufen.
Die Widerru...
Soweit in der Artikelbeschreibung keine andere Frist angegeben ist, erfolgt die Lieferung der Ware innerhalb von 3-5 Werktagen nach Vertragsschluss, bei Vorauszahlung erst nach Eingang des vollständigen Kaufpreises und der Versandkosten. Alle Preise inkl. MwSt.