Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Un livre complet et pratique, rédigé par des experts reconnus, qui traite les concepts fondamentaux de la sécurité informatique, à destination des étudiants en informatique, des administrateurs de systèmes et de réseaux, DSI et responsables de projets. Les auteurs, experts reconnus de la sécurité informatique, abordent les sujets essentiels en matière de cybersécurité (en particulier pour se former aux certifications, Framework NIST). Ce livre couvre les quatre défis posés par la création d’un système de sécurité informatique efficace. Sécurisation : de l’infrastructure, des appareils (hardware, ordinateurs), des réseaux locaux, du périmètre. Les auteurs exposent les concepts fondamentaux propres à chacun de ces défis et présentent, à travers des scénarios réalistes, les vulnérabilités rencontrées au quotidien dans les systèmes informatiques. Ils proposent des exercices pratiques pour vous aider à évaluer votre compréhension des notions clés : Systèmes de sécurité et de surveillance de base ; Systèmes de détection et de signalement des intrusions ; Sécurité de l'hôte local ; Dispositifs de sécurisation ; Protéger le périmètre intérieur ; Protéger l'accès à distance ; Sécurité du réseau local ; Topologies et protocoles réseau.
Choose an application
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Information storage and retrieval systems --- Systèmes d'information --- Security measures --- Sécurité --- Mesures --- Systèmes d'information --- Sécurité --- Computer systems --- Security measures.
Choose an application
Computer networks are the spinal cord of our civilisation; because of the huge stakes involved, universities and certain companies must now teach the basics of computer system security. The purpose of this book is to help people learn about the fundamentals of this field through the study of solved exercices. The primary goal is not to create experts in this domain, but rather to teach the concepts required to understand the risks and consequences of computer system misuse. This book thus handles the basic aspects of computer security, including e-mail; viruses and antivirus programs; program and network vulnerabilities; fire walls, address translation and filtering; cryptography; secure communications; secure applications; and security management.This work is a novel addition to the literature in that it gives, for each subject, a short summary of the main principles followed by a series of exercises (with solutions), resulting in a self-contained book that provides a solid foundation in computer security to students. Chapters in this book have been conceived to be as independent as possible. All of them, nevertheless, require a background in computer science and a familiarity with the most common network protocols. [Publisher]
Computer security. --- Sécurité informatique --- Computer security --- Computer systems --- Data protection --- Systèmes informatiques --- Protection de l'information (informatique) --- Safety measures --- Mesures de sécurité --- Sécurité informatique --- Safety measures. --- Mesures de sécurité. --- Systèmes informatiques --- Mesures de sécurité.
Choose an application
Computer security --- Computer viruses --- Computerbeveiliging --- Computergegevens--Bescherming --- Computers--Beveiliging --- Computervirussen --- Data protection --- Données [Protection des ] --- Gegevens--Bescherming --- Gegevensbescherming --- Informatique--Sécurité --- Protection des données --- Sécurité informatique --- Virus d'ordinateur --- ABB9606-IVB --- 681.3 --- 12.03 --- Computerwetenschap --- Preventie ; Diefstal ; Fraude --- Databases --- Security measures --- Virus informatiques --- Systèmes informatiques --- ORDINATEURS --- SECURITE
Choose an application
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.
Computer security --- Data encryption (Computer science) --- Sécurité informatique --- Chiffrement (Informatique) --- Computerbeveiliging --- Data encryptie --- Computernetwerken --- Netwerkbeveiliging --- Programmeren --- codes --- veiligheid --- software --- Computernetwerken. --- Netwerkbeveiliging. --- Programmeren. --- Computer security. --- Sécurité informatique --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 5 of 5 |
Sort by
|