当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detectio

Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detectio

书名:Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detectio

上传:石头

时间:2009-12-26

文件大小:10.1 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Hossein Bidgoli
出版日期:January 3, 2006
出版社:Wiley Publishing
页数:1152
ISBN:ISBN-10: 0471648329 ISBN-13: 978-0471648321
文件格式:PDF

Product Description
The Handbook of Information Security is a definitive 3-volume handbookthat offers coverage of both established and cutting-edge theories anddevelopments on information and computer security. The text contains180 articles from over 200 leading experts, providing the benchmarkresource for information security, network security, informationprivacy, and information warfare.About the Author
Hossein Bidgoli, Ph.D., isprofessor Management Information Systems at California StateUniversity. Dr. Bidgoli helped set up the first PC lab in the UnitedStates. he is the author of 43 textbooks, 27 manuals and over fivedozen technical articles and papers on various aspects of computerapplications, information systems and network security, e-commerce anddecision support systems published and presented throughout the world.Dr. Bidgoli also serves as the editor -in-chief of the InternetEncyclopedia and the Encyclopedia of Information Systems. TheEncyclopedia of Information Systems.The Encyclopedia of InformationSystems was the recipient of one of the Library Journal’s BestReference Sources for 2002 and The Internet Encyclopedia was recipientof one of the PSP Awards (Professional and Scholarly Publishing), 2004.Dr. Bidgoli was selected as the California State University,Bakersfield’s 2001-2002 Professor of the Year.
Tags:DetectionHandbookManagementPreventionVolume


相关书籍

  • Handbook of Research on Web Log Analysis (PDF英文版)
  • The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
  • Handbook of Research on Wireless Security
  • The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
  • Xen Virtualization: A Practical Handbook

评论 (1) 1 All

登陆 | 还没注册?