- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Written by an international team of experts, this one-stop reference maps out the latest user authentication methods, as well as authorization and access controls and their applications in today's database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens.
Contents
Introduction; Security Concepts, Services and Threats; Business-Integrated Information Security Management; User Authentication Technologies; Authorization and Access Control; Data Centric Applications; Modern Cryptology; Network Security; Standard Public Key and Privilege Management Infrastructures; Smart Cards and Tokens; Privacy and Privacy-Enhancing Technologies (PETs); Content Filtering Technologies and the Law; Model for Cybercrime Investigation; Systemic Holistic Approach to IT Security; Electronic Voting Systems; On Mobile Wiki Systems Security; Author's Biographies.



