登入
選單
返回
Google圖書搜尋
The Information Security Dictionary
Urs E. Gattiker
其他書名
Defining the Terms That Define Security for E-Business, Internet, Information, and Wireless Technology
出版
Springer Science & Business Media
, 2004
主題
Business & Economics / Careers / General
Business & Economics / Information Management
Business & Economics / Business Mathematics
Computers / General
Computers / Computer Science
Computers / Database Administration & Management
Computers / Information Theory
Computers / Information Technology
Computers / Management Information Systems
Computers / Security / Network Security
Computers / Programming / Algorithms
Computers / Security / General
Computers / Security / Cryptography & Encryption
Language Arts & Disciplines / Library & Information Science / General
Mathematics / Discrete Mathematics
Reference / Dictionaries
ISBN
1402078897
9781402078897
URL
http://books.google.com.hk/books?id=Z63j0hWZ1W0C&hl=&source=gbs_api
EBook
SAMPLE
註釋
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection terms, without causing much damage to the usually slim student pocketbook. This dictionary can help non-specialistreaders better understand the infor- tion security issues encountered in their work or studying for their certification examination or whilst doing a practical assignment as part of a workshop. This book is also essential to a reference collection for an organization’s system personnel. Special attention is paid to terms which most often prevent educated readers from understanding journal articles and books in cryptology, computing science, and information systems, in addition to applied fields that build on those disciplines, such as system design, security auditing, vulnera- lity testing, and role-based access management. The dictionary provides defi- tions that enable readers to get through a difficult article or passage. We do not, for the most part, directly explain how to conduct research or how to implement the terms briefly described.