V okencu izberite šolo in razred v prihodnjem šolskem letu in prihranite

.
 
.

Information Security The Complete Reference

.
Redna cena: 62,23 €
Predvideni rok dobave: 14-21 dni
.
.
.
Količina:  
.
Strošek dostave je enoten za celo Slovenijo in znaša 2,95 €, ne glede na količino in vrsto kupljenih izdelkov.

Številni izdelki imajo oznako "brezplačna dostava", kar pomeni, da v prmeru nakupa takšnega izdelka poštnine ne boste plačali. 

Več o dostavi
Emka.si omogoča naslednje načine plačila:
  • z gotovino ob prevzemu (velja le za fizične osebe),
  • s plačilno oziroma kreditno kartico (Mastercard, Visa, ActivaMaestro, Activa, Diners, American Express),
  • s storitvijo Moneta (Mobitel in Simobil)
  • Plačilo po predračunu (pravne osebe)
  • Račun z odlogom plačila (za javna podjetja)
Več o plačilih

Pri vsakem izdelku je naveden predviden rok dostave. Glede na to katere izdelke izberete, se vam pri oddaji naročila prikaže tudi končni predviden datum dobave vašega pakete.

Večino izdelkov dostavljamo iz lastne zaloge, zato so naši dobavni roki zelo kratki.

Ko vam bomo poslali paket boste o tem obveščeni tudi po emailu. V emailu bo navedena številka vašega paketa ter povezava do Pošte Slovenije, kjer boste lahko preverili natančen status dostave.

Več o dostavi

To je spletna cena
Shrani v seznam želja
.

.

Opis

This thorough update to the most authoritative volume available on network security covers the latest security standards and regulations. Network Security: The Complete Reference, Second Edition guides security practitioners through how to plan, implement, and maintain a secure network, protect confidential information, and ensure corporate networks are in compliance with the latest regulations. The book covers essential standards, such as ISO 27001, CoBIT, and SAS 70. Important legal regulations (and their context and relevance), such as Sarbanes-Oxley (SOX), SB 1386, SB 1841, FFIEC, Gramm-Leach-Bliley (GLB), and HIPAA are highlighted throughout where their relevance intersects with topics--enhancing this edition's value and practicality. This authoritative volume includes contributions from 30+ technical experts and leaders in the security industry. New chapters have been added on VoIP security, controlling application behavior, and operational security. The chapters covering system security, planning and response, and standards compliance have been extensively revised. The 37 chapters are divided into six parts. Part 1 covers the elements of network security foundations including policies, organization, and defense models. Part II covers access control, including security management, operational security, and data security. Part III gets into key network security aspects, including firewalls, virtual private networks, wireless security, VoIP security, and more. Part IV explains system security, focusing on security models, UNIX, Linux, and Windows Security. Part V covers application security, including J2EE, Windows .NET, database security, writing secure software, and more. Part VI explains planning and response, including disaster recovery, attacks and countermeasures, incident response, as well as legal, regulatory, and standards compliance. Network Security: The Complete Reference, Second Edition Now presents essential security standards and regulation information paired with related topics throughout the book, greatly enhancing ease-of-use and the ability to readily apply business recommendations Teaches end-to-end IT security concepts and techniques, complete with methodology, analysis, case examples, tips, and all the technical supporting details needed to suit an IT audience's requirements Spans from a beginner to advanced practitioner level Includes detailed updates on how to assure business compliance with IT standards and regulations, including ISO 27001, CoBIT, SAS 70, and SOX Offers completely updated coverage of Linux/UNIX, wireless, secure Windows, VPN, software development, and physical premises Contains comprehensive information on how to design an effective security defense model, develop and deploy computer, personnel, and physical security policies, design and manage authentication and authorization methods, and much more
.
.
.

O avtorju - Mark Rhodes-Ousley

Obvestite me o novi knjigi tega avtorja

Želite, da vas po elektronski pošti obvestimo, ko izide nova knjiga ali ponatis katere od knjig tega avtorja?

DA - obveščajte me o novostih avtorja
.
.
.
.

Podrobnosti o izdelku

Mnenja kupcev

  0  ocen:
5 zvezdice
0%
(0)
4 zvezdice
0%
(0)
3 zvezdice
0%
(0)
2 zvezdice
0%
(0)
1 zvezdica
0%
(0)
Povprečna ocena kupcev:
Ocena kupcev: 0
(0 ocen uporabnikov )
.
Ocenite izdelek s klikom na zvezdice:
 
.
.
.
.
.

Oznake kupcev o tem izdelku

Kliknite na posamezno oznako za prikaz vseh izdelkov označenih s to oznako:

Dodaj oznako:

Dodaj
.