|Eingestellt in Kategorie:
Dieses Angebot wurde verkauft am Do, 8. Mai um 06:33.
Computer Security and the Internet Tools and Jewels
Verkauft
Computer Security and the Internet Tools and Jewels
US $49,03US $49,03
Do, 08. Mai, 18:33Do, 08. Mai, 18:33
Ähnlichen Artikel verkaufen?

Computer Security and the Internet Tools and Jewels

RomeGA Trading
(98)
Angemeldet als privater Verkäufer
Verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, finden daher keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
US $49,03
Ca.CHF 40,13
Artikelzustand:
Sehr gut
Great condition, no marks, notes or highlights that we found. Some minor shelf wear, however hardly ... Mehr erfahrenÜber den Artikelzustand
    Versand:
    Kostenlos USPS Media MailTM.
    Standort: Rome, Georgia, USA
    Lieferung:
    Lieferung zwischen Di, 10. Jun und Mo, 16. Jun nach 94104 bei heutigem Zahlungseingang
    Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
    Rücknahme:
    Keine Rücknahme.
    Zahlungen:
         Diners Club

    Sicher einkaufen

    eBay-Käuferschutz
    Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
    Der Verkäufer ist für dieses Angebot verantwortlich.
    eBay-Artikelnr.:196708485110
    Zuletzt aktualisiert am 11. Feb. 2025 05:35:07 MEZAlle Änderungen ansehenAlle Änderungen ansehen

    Artikelmerkmale

    Artikelzustand
    Sehr gut
    Buch, das nicht neu aussieht und gelesen wurde, sich aber in einem hervorragenden Zustand befindet. Der Einband weist keine offensichtlichen Beschädigungen auf. Bei gebundenen Büchern ist der Schutzumschlag vorhanden (sofern zutreffend). Alle Seiten sind vollständig vorhanden, es gibt keine zerknitterten oder eingerissenen Seiten und im Text oder im Randbereich wurden keine Unterstreichungen, Markierungen oder Notizen vorgenommen. Der Inneneinband kann minimale Gebrauchsspuren aufweisen. Minimale Gebrauchsspuren. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers. Alle Zustandsdefinitionen ansehenwird in neuem Fenster oder Tab geöffnet
    Hinweise des Verkäufers
    “Great condition, no marks, notes or highlights that we found. Some minor shelf wear, however hardly ...
    Fach
    Informatik/EDV
    EAN
    9783030336486
    ISBN
    3030336484
    Gewicht
    900g

    Über dieses Produkt

    Product Identifiers

    Publisher
    Springer International Publishing A&G
    ISBN-10
    3030336484
    ISBN-13
    9783030336486
    eBay Product ID (ePID)
    9038750963

    Product Key Features

    Number of Pages
    Xxii, 365 Pages
    Language
    English
    Publication Name
    Computer Security and the Internet : Tools and Jewels
    Publication Year
    2020
    Subject
    Engineering (General), Networking / General, Security / General, General
    Type
    Textbook
    Subject Area
    Mathematics, Computers, Technology & Engineering
    Author
    Paul C. Van Oorschot
    Series
    Information Security and Cryptography Ser.
    Format
    Hardcover

    Dimensions

    Item Weight
    33.8 Oz
    Item Length
    10 in
    Item Width
    7 in

    Additional Product Features

    Dewey Edition
    23
    Reviews
    "This excellent book covers several useful and very practical topics in computer security, from cryptographic protocols to software vulnerabilities and malware. It is full of very thoughtful examples, lots of handy illustrations, and even small exercises for teaching purposes. ... the book is a good compromise between understanding the essentials of computer security and giving concise yet useful examples and explanations. I really enjoyed reading it." (Santiago Escobar, Computing Reviews, January 4, 2021)
    Number of Volumes
    1 vol.
    Illustrated
    Yes
    Dewey Decimal
    005.8
    Table Of Content
    Basic Concepts and Principles.- Cryptographic Building Blocks.- User Authentication: Passwords, Biometrics and Alternatives.- Authentication Protocols and Key Establishment.- Operating System Security and Access Control.- Software Security: Exploits and Privilege Escalation.- Malicious Software.- Public-Key Certificate Management and Use Cases.- Web and Browser Security.- Firewalls and Tunnels.- Intrusion Detection and Network-Based Attacks.- Epilogue.- Index.
    Synopsis
    This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security - including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is "elementary" in that it assumes no background in security, but unlike "soft" high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology., This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security, including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 300 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow aim to provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is "elementary" in that it assumes no background in security, but unlike "soft" high-level texts, does not avoid low-level details; instead it selectively dives into fine points for exemplary topics, to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.
    LC Classification Number
    QA75.5-76.95

    Artikelbeschreibung des Verkäufers

    Info zu diesem Verkäufer

    RomeGA Trading

    100% positive Bewertungen339 Artikel verkauft

    Mitglied seit Mai 2003
    Angemeldet als privater VerkäuferDaher finden verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
    Shop besuchenKontakt

    Detaillierte Verkäuferbewertungen

    Durchschnitt in den letzten 12 Monaten
    Genaue Beschreibung
    5.0
    Angemessene Versandkosten
    5.0
    Lieferzeit
    5.0
    Kommunikation
    5.0

    Verkäuferbewertungen (81)

    Alle Bewertungen
    Positiv
    Neutral
    Negativ
      • l***z (13)- Bewertung vom Käufer.
        Letzter Monat
        Bestätigter Kauf
        Good condition
      Alle Bewertungen ansehen