Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME. The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network.
Provides information necessary to set up a data quality program, and to make and maintain improvements to data quality. The text covers all aspects of data management to provide analysis of quality problems and their impacts, potential solutions, and how they are combined.
Identifies potential threats associated with software developments. The text also explains how to establish an effective risk management programme and details critical steps involved, including asset valuation, security threat identification, security and control testing, and safeguard assessment.
This work discusses the most widely-used programming languages and their functional pros and cons for application and development. Coverage includes a brief overview of programming languages principles and concepts; and numerous diagrams, charts and sample programs.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.