Online Resources xiiiNotation xivAbout the Authors xvPreface xviiChapt terjemahan - Online Resources xiiiNotation xivAbout the Authors xvPreface xviiChapt Bahasa Indonesia Bagaimana mengatakan

Online Resources xiiiNotation xivAb

Online Resources xiii
Notation xiv
About the Authors xv
Preface xvii
Chapter 0 Reader’s and Instructor’s Guide 1
0.1 Outline of This Book 2
0.2 A Roadmap for Readers and Instructors 2
0.3 Support for CISSP Certification 3
0.4 Internet and Web Resources 5
0.5 Standards 7
Chapter 1 Overview 9
1.1 Computer Security Concepts 10
1.2 Threats, Attacks, and Assets 18
1.3 Security Functional Requirements 23
1.4 A Security Architecture for Open Systems 26
1.5 Computer Security Trends 31
1.6 Computer Security Strategy 33
1.7 Recommended Reading and Web Sites 35
1.8 Key Terms, Review Questions, and Problems 36
PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38
Chapter 2 Cryptographic Tools 38
2.1 Confidentiality with Symmetric Encryption 39
2.2 Message Authentication and Hash Functions 46
2.3 Public-Key Encryption 54
2.4 Digital Signatures and Key Management 59
2.5 Random and Pseudorandom Numbers 62
2.6 Practical Application: Encryption of Stored Data 64
2.7 Recommended Reading and Web Sites 66
2.8 Key Terms, Review Questions, and Problems 67
Chapter 3 User Authentication 71
3.1 Means of Authentication 73
3.2 Password-Based Authentication 73
3.3 Token-Based Authentication 84
3.4 Biometric Authentication 88
3.5 Remote User Authentication 93
3.6 Security Issues for User Authentication 95
3.7 Practical Application: An Iris Biometric System 97
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
Online Resources xiiiNotasi xivTentang penulis xvKata pengantar xviiBab 0 pembaca dan instruktur panduan 10.1 garisbesar kitab ini 20.2 Roadmap untuk pembaca dan instruktur 20.3 dukungan untuk sertifikasi CISSP 30.4 Internet dan Web Resources 50,5 standar 7Ikhtisar Bab 1 91.1 konsep keamanan komputer 101.2 ancaman, serangan, dan aset 181.3 keamanan persyaratan fungsional 231.4 arsitektur keamanan untuk sistem terbuka 261.5 komputer keamanan tren 311.6 strategi keamanan komputer 331.7 dianjurkan membaca dan situs Web 351.8 istilah kunci, meninjau pertanyaan dan masalah 36BAGIAN SATU: TEKNOLOGI KEAMANAN KOMPUTER DAN PRINSIP-PRINSIP 38Bab 2 kriptografi alat 382.1 kerahasiaan dengan simetris enkripsi 392.2 pesan otentikasi dan fungsi Hash 462.3 enkripsi kunci publik 542.4 tanda tangan digital dan manajemen kunci 592.5 acak dan Pseudorandom nomor 622.6 aplikasi praktis: Enkripsi Data yang tersimpan 642.7 dianjurkan membaca dan situs Web 662.8 istilah kunci, meninjau pertanyaan dan masalah 67Bab 3 otentikasi pengguna 713.1 sarana otentikasi 733.2 password otentikasi berbasis 733.3 token otentikasi berbasis 843.4 otentikasi biometrik 883.5 otentikasi pengguna remote 933.6 masalah keamanan untuk otentikasi pengguna 953.7 aplikasi praktis: Iris sistem biometrik 97
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
Online Resources xiii
Notation xiv
About the Authors xv
Preface xvii
Chapter 0 Reader’s and Instructor’s Guide 1
0.1 Outline of This Book 2
0.2 A Roadmap for Readers and Instructors 2
0.3 Support for CISSP Certification 3
0.4 Internet and Web Resources 5
0.5 Standards 7
Chapter 1 Overview 9
1.1 Computer Security Concepts 10
1.2 Threats, Attacks, and Assets 18
1.3 Security Functional Requirements 23
1.4 A Security Architecture for Open Systems 26
1.5 Computer Security Trends 31
1.6 Computer Security Strategy 33
1.7 Recommended Reading and Web Sites 35
1.8 Key Terms, Review Questions, and Problems 36
PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38
Chapter 2 Cryptographic Tools 38
2.1 Confidentiality with Symmetric Encryption 39
2.2 Message Authentication and Hash Functions 46
2.3 Public-Key Encryption 54
2.4 Digital Signatures and Key Management 59
2.5 Random and Pseudorandom Numbers 62
2.6 Practical Application: Encryption of Stored Data 64
2.7 Recommended Reading and Web Sites 66
2.8 Key Terms, Review Questions, and Problems 67
Chapter 3 User Authentication 71
3.1 Means of Authentication 73
3.2 Password-Based Authentication 73
3.3 Token-Based Authentication 84
3.4 Biometric Authentication 88
3.5 Remote User Authentication 93
3.6 Security Issues for User Authentication 95
3.7 Practical Application: An Iris Biometric System 97
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2024 I Love Translation. All reserved.

E-mail: