楼主: cmwei333
1560 3

【信息安全:参考大全】 Information Security : The Complete Reference (2e) [推广有奖]

贵宾

已卖:205122份资源

泰斗

1%

还不是VIP/贵宾

-

TA的文库  其他...

【历史+心理学+社会自然科学】

【数学+统计+计算机编程】

【金融+经济+商学+国际政治】

威望
6
论坛币
3606533 个
通用积分
1126.0351
学术水平
4327 点
热心指数
4650 点
信用等级
3957 点
经验
363248 点
帖子
9795
精华
9
在线时间
2842 小时
注册时间
2015-2-9
最后登录
2017-1-29

初级热心勋章 中级热心勋章 高级热心勋章 初级信用勋章 中级信用勋章 初级学术勋章 特级热心勋章 中级学术勋章 高级信用勋章 高级学术勋章 特级学术勋章 特级信用勋章

楼主
cmwei333 发表于 2016-12-25 09:14:44 |AI写论文

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币
Information Security: The Complete Reference, 2nd Edition

by Mark Rhodes-Ousley  (Author)

cover.jpeg

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security―from concepts to details―this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.

Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike.

Understand security concepts and building blocks
Identify vulnerabilities and mitigate risk
Optimize authentication and authorization
Use IRM and encryption to protect unstructured data
Defend storage devices, databases, and software
Protect network routers, switches, and firewalls
Secure VPN, wireless, VoIP, and PBX infrastructure
Design intrusion detection and prevention systems
Develop secure Windows, Java, and mobile applications
Perform incident response and forensic analysis

目录截图:

pic.png

原版 PDF + EPUB:

本帖隐藏的内容

原版 PDF:
Information Security_The Complete Reference (2nd Edition).pdf (23.59 MB, 需要: 18 个论坛币)

PDF 压缩包:
IS (pdf).zip (20.8 MB, 需要: 18 个论坛币) 本附件包括:
  • Information Security_The Complete Reference (2nd Edition).pdf


EPUB:
Information Security_The Complete Reference (2nd Edition).epub (17.53 MB, 需要: 18 个论坛币)

EPUB 压缩包:
IS (epub).zip (17.52 MB, 需要: 18 个论坛币) 本附件包括:
  • Information Security_The Complete Reference (2nd Edition).epub


PDF + EPUB 压缩包:
IS (pdf epub).zip (38.32 MB, 需要: 36 个论坛币) 本附件包括:
  • Information Security_The Complete Reference (2nd Edition).pdf
  • Information Security_The Complete Reference (2nd Edition).epub


二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:information Informatio formation Reference informat previously computing effective security Network

本帖被以下文库推荐

bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3257
bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3258
bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3259

沙发
life_life(真实交易用户) 发表于 2016-12-25 09:41:29
thanks ....

藤椅
maxine2001(真实交易用户) 发表于 2016-12-25 10:16:14

板凳
acctoftony(真实交易用户) 发表于 2016-12-25 22:16:10
谢谢分享。

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加好友,备注jltj
拉您入交流群
GMT+8, 2025-12-30 15:46