Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
netwerkinfrastructuur --- ip --- netwerkbeveiliging --- PXL-Digital 2020 --- informatica --- computernetwerken
Choose an application
We leven in een tijdperk van universele elektronische connectiviteit, waarin virussen, hackers, elektronisch aflui
Beveiliging: computernetwerken --- Cryptografie --- 681.324 --- Netwerkbeveiliging --- Beveiliging: computernetwerken. --- Cryptografie. --- Computer architecture. Operating systems --- cryptografie --- netwerkbeheer --- algoritmen --- netwerken (informatica) --- computerbeveiliging --- Cryptography (Cryptografie, Netwerkbeveiliging) --- Netwerktechnologie --- Netwerkbeveiliging en cryptografie --- 519.72 --- Computernetwerken (Netwerken informatica)
Choose an application
004.056.55 --- cryptografie --- encryptie --- netwerkbeveiliging --- netwerken --- veiligheid computers --- data-encryptie
Choose an application
netwerkbeheer --- PXL-Digital 2020 --- informatica --- informatica toepassingen --- Windows server 2019 --- Windows 10 --- netwerkbeveiliging --- Computer architecture. Operating systems --- LAN (local area network)
Choose an application
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.
Computer security --- Data encryption (Computer science) --- Sécurité informatique --- Chiffrement (Informatique) --- Computerbeveiliging --- Data encryptie --- Computernetwerken --- Netwerkbeveiliging --- Programmeren --- codes --- veiligheid --- software --- Computernetwerken. --- Netwerkbeveiliging. --- Programmeren. --- Computer security. --- Sécurité informatique --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
003.26 --- 65.012.8 --- 681.3*D46 --- 519.72 --- 681.3 --- 681.3.02 --- 681.324 --- Computernetwerken (Netwerken informatica) --- Cryptography (Cryptografie, Netwerkbeveiliging) --- ICT-Informatie- en communicatietechnologie --- Informatiebeveiliging --- Cryptografie --- Maple --- Netwerkbeveiliging --- Cryptografische schriftsoorten. Geheimschrift --- Maintenance of secrecy. Protection of confidential information. Security --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 65.012.8 Maintenance of secrecy. Protection of confidential information. Security --- 003.26 Cryptografische schriftsoorten. Geheimschrift
Choose an application
Computer security. --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Computer security --- Security measures --- netwerkbeveiliging --- softwareontwikkeling --- softwarebeveiliging --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Computer networks - Security measures
Choose an application
Dit boek is gebaseerd oop een model met vijf protocollagen, in de geest van TCP/IP. Elke laag wordt eerst theoretisch behandeld en dan aan de hand van een aantal bestaande netwerken verduidelijkt. Als belangrijkste voorbeelden worden het Internet en A£TM-netwerken gebruikt, maar ook veel andere computernetwerken komen aan de orde. (Bron: covertekst)
073241.jpg --- Computernetwerken --- Protocollen --- Computer architecture. Operating systems --- computernetwerken --- OSI (open system interconnection) --- TCP/IP (transmission control protocol/internet protocol) --- netwerken (informatica) --- datacommunicatie --- Computernetwerken. --- Datatransmissienetwerken. --- Protocollen. --- 681.324 --- 681.3 --- Computerbeveiligingssystemen --- Computernetwerken (Netwerken informatica) --- Cryptography (Cryptografie, Netwerkbeveiliging) --- Informatica (computers) --- infobib --- 004.7
Choose an application
Programming --- cryptografie --- computerbeveiliging --- Computer architecture. Operating systems --- 519.72 --- 091.14:003.26 --- 519.76 --- 681.3 --- Computerbeveiligingssystemen --- Cryptography (Cryptografie, Netwerkbeveiliging) --- databeveiliging (informatiebeveiliging) --- elektronisch geld --- internet --- Information theory: mathematical aspects --- Codices--Geheimschrift, cryptografie --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- 091.14:003.26 Codices--Geheimschrift, cryptografie --- 519.72 Information theory: mathematical aspects
Choose an application
computernetwerk --- wan --- tcp/ip --- isdn --- netwerkbeveiliging --- linux --- windows --- Microsoft Windows (Computer file) --- Study guides --- Operating systems (Computers) --- Computer networks --- Internetworking (Telecommunication) --- Inter-networking (Telecommunication) --- Interoperability in computer networks --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Listing 1 - 10 of 12 | << page >> |
Sort by
|