xviii PREFACEBACKGROUNDInterest in education in computer security and  terjemahan - xviii PREFACEBACKGROUNDInterest in education in computer security and  Bahasa Indonesia Bagaimana mengatakan

xviii PREFACEBACKGROUNDInterest in

xviii PREFACE
BACKGROUND
Interest in education in computer security and related topics has been growing at a dramatic
rate in recent years. This interest has been spurred by a number of factors, two of which
stand out:
1. As information systems, databases, and Internet-based distributed systems and communication
have become pervasive in the commercial world, coupled with the
increased intensity and sophistication of security-related attacks, organizations
now recognize the need for a comprehensive security strategy. This strategy encompasses
the use of specialized hardware and software and trained personnel to meet
that need.
2. Computer security education, often termed information security education or information
assurance education , has emerged as a national goal in the United States and other
countries, with national defense and homeland security implications. Organizations such
as the Colloquium for Information System Security Education and the National Security
Agency’s (NSA) Information Assurance Courseware Evaluation (IACE) Program are
spearheading a government role in the development of standards for computer security
education.
Accordingly, the number of courses in universities, community colleges, and other
institutions in computer security and related areas is growing.
OBJECTIVES
The objective of this book is to provide an up-to-date survey of developments in computer
security. Central problems that confront security designers and security administrators
include defining the threats to computer and network systems, evaluating the relative risks
of these threats, and developing cost-effective and user-friendly countermeasures.
The following basic themes unify the discussion:
• Principles: Although the scope of this book is broad, there are a number of basic
principles that appear repeatedly as themes and that unify this field. Examples are
issues relating to authentication and access control. The book highlights these principles
and examines their application in specific areas of computer security.
• Design approaches: The book examines alternative approaches to meeting specific
computer security requirements.
• Standards: Standards have come to assume an increasingly important, indeed dominant,
role in this field. An understanding of the current status and future direction of technology
requires a comprehensive discussion of the related standards.
• Real-world examples: A number of chapters include a section that shows the practical
application of that chapter’s principles in a real-world environment.
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
xviii PREFACE
BACKGROUND
Interest in education in computer security and related topics has been growing at a dramatic
rate in recent years. This interest has been spurred by a number of factors, two of which
stand out:
1. As information systems, databases, and Internet-based distributed systems and communication
have become pervasive in the commercial world, coupled with the
increased intensity and sophistication of security-related attacks, organizations
now recognize the need for a comprehensive security strategy. This strategy encompasses
the use of specialized hardware and software and trained personnel to meet
that need.
2. Computer security education, often termed information security education or information
assurance education , has emerged as a national goal in the United States and other
countries, with national defense and homeland security implications. Organizations such
as the Colloquium for Information System Security Education and the National Security
Agency’s (NSA) Information Assurance Courseware Evaluation (IACE) Program are
spearheading a government role in the development of standards for computer security
education.
Accordingly, the number of courses in universities, community colleges, and other
institutions in computer security and related areas is growing.
OBJECTIVES
The objective of this book is to provide an up-to-date survey of developments in computer
security. Central problems that confront security designers and security administrators
include defining the threats to computer and network systems, evaluating the relative risks
of these threats, and developing cost-effective and user-friendly countermeasures.
The following basic themes unify the discussion:
• Principles: Although the scope of this book is broad, there are a number of basic
principles that appear repeatedly as themes and that unify this field. Examples are
issues relating to authentication and access control. The book highlights these principles
and examines their application in specific areas of computer security.
• Design approaches: The book examines alternative approaches to meeting specific
computer security requirements.
• Standards: Standards have come to assume an increasingly important, indeed dominant,
role in this field. An understanding of the current status and future direction of technology
requires a comprehensive discussion of the related standards.
• Real-world examples: A number of chapters include a section that shows the practical
application of that chapter’s principles in a real-world environment.
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
xviii PENGANTAR
LATAR BELAKANG
Minat pendidikan dalam keamanan komputer dan topik terkait telah tumbuh dengan dramatis
tingkat dalam beberapa tahun terakhir. Bunga ini telah didorong oleh sejumlah faktor, dua di antaranya
menonjol:
1. Sebagai sistem informasi, database, dan Internet berbasis sistem terdistribusi dan komunikasi
telah menjadi meluas di dunia komersial, ditambah dengan
meningkatnya intensitas dan kecanggihan serangan yang berhubungan dengan keamanan, organisasi
sekarang menyadari kebutuhan untuk strategi keamanan yang komprehensif. Strategi ini meliputi
penggunaan perangkat keras khusus dan perangkat lunak dan personil terlatih untuk memenuhi
kebutuhan itu.
2. Pendidikan keamanan komputer, sering disebut pendidikan keamanan informasi atau informasi
pendidikan jaminan, telah muncul sebagai tujuan nasional di Amerika Serikat dan lainnya
negara, dengan pertahanan nasional dan tanah air implikasi keamanan. Organisasi seperti
sebagai Keamanan Nasional Pendidikan Kolokium untuk Sistem Informasi Keamanan dan
(NSA) Informasi Jaminan Courseware Evaluasi (IACE) Program Badan yang
memelopori peran pemerintah dalam pengembangan standar untuk keamanan komputer
pendidikan.
Dengan demikian, jumlah mata kuliah di perguruan tinggi, perguruan tinggi, dan lainnya
institusi dalam keamanan komputer dan bidang terkait tumbuh.
TUJUAN
Tujuan dari buku ini adalah untuk memberikan survei up-to-date dari perkembangan komputer
keamanan. Masalah sentral yang dihadapi desainer keamanan dan administrator keamanan
termasuk mendefinisikan ancaman ke komputer dan sistem jaringan, mengevaluasi risiko relatif
. ancaman tersebut, dan mengembangkan penanggulangan hemat biaya dan user-friendly
Tema dasar berikut menyatukan diskusi:
• Prinsip: Meskipun ruang lingkup buku ini sangat luas, ada sejumlah dasar
prinsip yang muncul berulang-ulang sebagai tema dan menyatukan bidang ini. Contohnya adalah
masalah yang berhubungan dengan otentikasi dan kontrol akses. Buku ini menyoroti prinsip-prinsip ini
dan memeriksa aplikasi mereka di daerah tertentu dari keamanan komputer.
• Desain pendekatan: Buku ini mengupas pendekatan alternatif untuk memenuhi spesifik
. persyaratan keamanan komputer
• Standar: Standar telah datang untuk menganggap semakin penting, memang dominan,
peran dalam hal ini lapangan. Pemahaman tentang status saat ini dan arah masa depan teknologi
memerlukan pembahasan yang komprehensif dari standar terkait.
• contoh dunia nyata: Sejumlah bab termasuk bagian yang menunjukkan praktis
penerapan prinsip-prinsip yang bab dalam lingkungan dunia nyata.
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: