2 CHAPTER 0 / READER’S AND INSTRUCTOR’S GUIDEThis book, with its accom terjemahan - 2 CHAPTER 0 / READER’S AND INSTRUCTOR’S GUIDEThis book, with its accom Bahasa Indonesia Bagaimana mengatakan

2 CHAPTER 0 / READER’S AND INSTRUCT

2 CHAPTER 0 / READER’S AND INSTRUCTOR’S GUIDE
This book, with its accompanying Web site, covers a lot of material. Here we give
the reader an overview.
0.1 OUTLINE OF THIS BOOK
Following an introductory chapter, Chapter 1 , the book is organized into five parts:
Part One: Computer Security Technology and Principles: This part covers technical
areas that must underpin any effective security strategy. Chapter 2 lists
the key cryptographic algorithms, discusses their use, and discusses issues of
strength. The remaining chapters in this part look at specific technical areas of
computer security: authentication, access control, database security, malicious
software, denial of service, intrusion detection, and firewalls.
Part Two: Software Security and Trusted Systems: This part covers issues
concerning software development and implementation, including operating
systems, utilities, and applications. Chapter 10 covers the perennial issue
of buffer overflow, while Chapter 11 examines a number of other software
security issues. Chapter 12 takes an overall look at operating system security.
The final chapter in this part deals with trusted computing and multilevel
security, which are both software and hardware issues.
Part Three: Management Issues: This part is concerned with management
aspects of information and computer security. Chapters 14 and 15 focus
specifically on management practices related to risk assessment, the setting up
of security controls, and plans and procedures for managing computer security.
Chapter 16 looks at physical security measures that must complement the
technical security measures of Part One. Chapter 17 examines a wide range of
human factors issues that relate to computer security. A vital management tool
is security auditing, examined in Chapter 18 . Finally, Chapter 19 examines legal
and ethical aspects of computer security.
Part Four: Cryptographic Algorithms: Many of the technical measures that
support computer security rely heavily on encryption and other types of cryptographic
algorithms. Part Four is a technical survey of such algorithms.
Part Five: Internet Security: This part looks at the protocols and standards
used to provide security for communications across the Internet. Chapter 22
discusses some of the most important security protocols for use over the
Internet. Chapter 23 looks at various protocols and standards related to
authentication over the Internet. Chapter 24 examines important aspects of
wireless security.
A number of online appendices cover additional topics relevant to the book.
0.2 A ROADMAP FOR READERS AND INSTRUCTORS
This book covers a lot of material. For the instructor or reader who wishes a shorter
treatment, there are a number of alternatives.
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
2 CHAPTER 0 / READER’S AND INSTRUCTOR’S GUIDEThis book, with its accompanying Web site, covers a lot of material. Here we givethe reader an overview.0.1 OUTLINE OF THIS BOOKFollowing an introductory chapter, Chapter 1 , the book is organized into five parts:Part One: Computer Security Technology and Principles: This part covers technicalareas that must underpin any effective security strategy. Chapter 2 liststhe key cryptographic algorithms, discusses their use, and discusses issues ofstrength. The remaining chapters in this part look at specific technical areas ofcomputer security: authentication, access control, database security, malicioussoftware, denial of service, intrusion detection, and firewalls.Part Two: Software Security and Trusted Systems: This part covers issuesconcerning software development and implementation, including operatingsystems, utilities, and applications. Chapter 10 covers the perennial issueof buffer overflow, while Chapter 11 examines a number of other softwaresecurity issues. Chapter 12 takes an overall look at operating system security.The final chapter in this part deals with trusted computing and multilevelsecurity, which are both software and hardware issues.Part Three: Management Issues: This part is concerned with managementaspects of information and computer security. Chapters 14 and 15 focusspecifically on management practices related to risk assessment, the setting upof security controls, and plans and procedures for managing computer security.Chapter 16 looks at physical security measures that must complement thetechnical security measures of Part One. Chapter 17 examines a wide range ofhuman factors issues that relate to computer security. A vital management toolis security auditing, examined in Chapter 18 . Finally, Chapter 19 examines legaland ethical aspects of computer security.Part Four: Cryptographic Algorithms: Many of the technical measures thatsupport computer security rely heavily on encryption and other types of cryptographicalgorithms. Part Four is a technical survey of such algorithms.Part Five: Internet Security: This part looks at the protocols and standardsused to provide security for communications across the Internet. Chapter 22discusses some of the most important security protocols for use over theInternet. Chapter 23 looks at various protocols and standards related toauthentication over the Internet. Chapter 24 examines important aspects ofwireless security.A number of online appendices cover additional topics relevant to the book.0.2 A ROADMAP FOR READERS AND INSTRUCTORSThis book covers a lot of material. For the instructor or reader who wishes a shortertreatment, there are a number of alternatives.
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
2 BAB 0 / READER'S DAN INSTRUKTUR PETUNJUK
Buku ini, dengan situs web yang menyertainya, mencakup banyak bahan. Di sini kita berikan
. pembaca gambaran
0,1 GARIS BESAR BUKU INI
Setelah bab pendahuluan, Bab 1, buku ini disusun menjadi lima bagian:
Bagian Satu: Teknologi Komputer Keamanan dan Prinsip: Bagian ini meliputi teknis
daerah yang harus mendukung strategi keamanan yang efektif . Bab 2 daftar
algoritma kriptografi kunci, membahas penggunaannya, dan membahas isu-isu
kekuatan. Bab-bab yang tersisa di bagian ini melihat bidang teknis tertentu
keamanan komputer: otentikasi, kontrol akses, keamanan database, berbahaya
. software, penolakan layanan, deteksi intrusi, dan firewall
Bagian Dua: Security Software dan Sistem Terpercaya: Bagian ini mencakup isu-isu
tentang pengembangan perangkat lunak dan implementasi, termasuk operasi
sistem, utilitas, dan aplikasi. Bab 10 membahas isu abadi
dari buffer overflow, sedangkan Bab 11 membahas sejumlah perangkat lunak lain
masalah keamanan. Bab 12 mengambil tampilan keseluruhan pada sistem operasi keamanan.
Bab terakhir pada bagian ini berkaitan dengan komputasi terpercaya dan bertingkat
keamanan, yang kedua masalah software dan hardware.
Bagian Ketiga: Masalah Manajemen: Bagian ini berkaitan dengan manajemen
aspek informasi dan komputer keamanan. Bab 14 dan 15 fokus
khusus pada praktik manajemen yang berkaitan dengan penilaian resiko, pembentukan
kontrol keamanan, dan rencana dan prosedur untuk mengelola keamanan komputer.
Bab 16 membahas langkah-langkah keamanan fisik yang harus melengkapi
langkah-langkah keamanan teknis Bagian Satu. Bab 17 membahas berbagai
isu faktor manusia yang berhubungan dengan keamanan komputer. Sebuah alat manajemen yang sangat penting
adalah audit keamanan, diperiksa dalam Bab 18. Akhirnya, Bab 19 mengkaji hukum
dan etika aspek keamanan komputer.
Bagian Keempat: Kriptografi Algoritma: Banyak langkah-langkah teknis yang
mendukung keamanan komputer sangat bergantung pada enkripsi dan jenis-jenis kriptografi
algoritma. Bagian Keempat adalah survei teknis algoritma tersebut.
Bagian Kelima: Internet Security: Bagian ini membahas protokol dan standar
yang digunakan untuk memberikan keamanan untuk komunikasi di Internet. Bab 22
membahas beberapa protokol keamanan yang paling penting untuk digunakan selama
Internet. Bab 23 membahas berbagai protokol dan standar yang berkaitan dengan
otentikasi melalui Internet. Bab 24 membahas aspek-aspek penting dari
keamanan nirkabel.
Sejumlah lampiran secara online mencakup topik tambahan yang relevan dengan buku.
0,2 PETA JALAN UNTUK PEMBACA DAN INSTRUKTUR
Buku ini mencakup banyak bahan. Untuk instruktur atau pembaca yang ingin lebih pendek
pengobatan, ada sejumlah alternatif.
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: