Artech House Computer Security Series - Böcker
Visar alla böcker i serien Artech House Computer Security Series. Handla med fri frakt och snabb leverans.
7 produkter
7 produkter
1 451 kr
Skickas inom 5-8 vardagar
This handbook offers an in-depth understanding of basic security problems and relevant solutions for those charged with maintaining the security of e-commerce sites. From designing secure Web, e-commerce and mobile commerce applications, to securing your internal network, to providing secure employee/user authentication, this book is structured to provide a comprehensive overview or help the reader pinpoint topics of immediate concern.
1 467 kr
Skickas inom 5-8 vardagar
This innovative resource provides the most comprehensive coverage of software fault tolerance techniques to guide professionals through design, operation and performance. It features an in-depth discussion on the advantages and disadvantages of specific techniques, so practitioners can decide which ones are best suited for their work. The book examines key programming techniques such as assertions, checkpointing, and atomic actions, and provides design tips and models to assist in the development of critical software fault tolerance software systems that help ensure dependable performance. From software reliability, recovery and redundancy to design- and data-diverse software fault tolerance techniques, this practical reference provides detailed insight into techniques that will improve the overall quality of software.
1 531 kr
Skickas inom 5-8 vardagar
This extensively revised, new edition of the 1998 Artech House classic, "Internet and Intranet Security", offers professionals an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall technologies to help practitioners provide access control service, and discusses the cryptographic protocols used to provide today's communication security services. From TCP/IP networking and cryptographic fundamentals, to firewall technologies, communication security protocols, and public key infrastructures, this handy reference offers practical guidance in utilizing cutting-edge technologies to secure various applications in the field of e-commerce and e-business. The book explores the rationale behind the security technologies that have been proposed and deployed on the Internet, and shows how to implement security mechanisms and corresponding protocol specifications.
1 277 kr
Skickas
Generally society has been moving towards electronic payment systems since the 1970s, but it is only the arrival of the Internet and its vertiginous growth, that has made possible the recent advances in this area.
1 486 kr
Skickas inom 5-8 vardagar
As magnetic stripe cards are being replaced by chip cards that offer consumers and business greater protection against fraud, a new standard for this technology is being introduced by Europay, MasterCard and Visa (EMV). This volume presents a comprehensive overview of the EMV chip solution and explains how this technology provides a chip migration path, where interoperability plays a central role in the business model. The work offers an understanding of the security problems associated with magnetic stripe cards, and presents the business case for chip migration. Moreover, it explains the implementation of multi-application selection mechanisms in EMV chip cards and terminals, and shows you how to design a multi-application EMV chip card layout.
1 362 kr
Skickas inom 5-8 vardagar
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.
1 531 kr
Skickas inom 5-8 vardagar
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, "Role-Based Access Control", offers practitioners the very latest details on this popular network security model.