Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)
โ Scribed by Steven M. Furnell, Sokratis Katsikas, Javier Lopez, Ahmed Patel
- Year
- 2008
- Tongue
- English
- Leaves
- 377
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Written by an international team of experts, this one-stop reference maps out the latest user authentication methods, as well as authorization and access controls and their applications in today's database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens.
๐ SIMILAR VOLUMES
<span>This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from Februa