Computer Security et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 10,26
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Computer Security sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Computer Security [Anglais] [Broché]

Dieter Gollmann

Prix : EUR 53,21 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le mardi 28 octobre ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 30,28  
Broché EUR 53,21  
Broché --  
Vendez cet article - Prix de rachat jusqu'à EUR 10,26
Vendez Computer Security contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 10,26, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Description de l'ouvrage

20 décembre 2010
A completely up–to–date resource on computer security Assuming no previous experience in the field of computer security, this must–have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross–site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self–study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another. Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security Examines the foundations of computer security and its basic principles Addresses username and password, password protection, single sign–on, and more Discusses operating system integrity, hardware security features, and memory Covers Unix security, Windows security, database security, network security, web security, and software security Packed with in–depth coverage, this resource spares no details when it comes to the critical topic of computer security.

Offres spéciales et liens associés


Détails sur le produit


Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 3.4 étoiles sur 5  5 commentaires
8 internautes sur 9 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Not suitable as a textbook 20 mai 2011
Par Jean Val Jean - Publié sur Amazon.com
Format:Broché
The book definitely the reflects the author's deep intuition about the field of computer security. It's full of insight and useful generalizations.

However, such an abstract discussion is not appropriate for undergraduate level textbook. Especially, if this is the first time the student is exposed to security thinking.

For someone working in the field, the approach means a lot. It provides the often missed theoretical and general outlook.
1 internautes sur 1 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 A good overview, but extremely complex 23 avril 2013
Par Oranges - Publié sur Amazon.com
Format:Broché|Achat vérifié
This book provides a good overview of the history and implications of computer security. It begins by making everything easy to understand, but quickly falls into a mathematical jumble that had me, and others in my class, confused during the later chapters. My biggest gripe with the book is that it provides very complex mathematical "proofs" of security with no external explanation to those of us who do not understand these complex math concepts.
For example, it will state something like "As you can see by <complex formula here> the security would allow x to access y." No, I don't even know what you just showed me, and there's no explanation given for the symbols or what they might mean. You can't google for a symbol if you don't know what it is called either.
Overall, a useful primer, but very confusing in the later chapters. More explanation in English and less formulas would have been appreciated.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 I liked the book 13 novembre 2012
Par Safa - Publié sur Amazon.com
Format:Broché|Achat vérifié
I have bought it for lecture and book is good. It is very useful for security related courses. It covers unix and windows security also.
5.0 étoiles sur 5 Great Book 7 septembre 2013
Par BASIL - Publié sur Amazon.com
Format:Broché|Achat vérifié
The book has great and verity of security knowledge, it explain each concepts in few and simple steps. I really recommend this book for anyone want to enrich his knowledge in security.
1 internautes sur 2 ont trouvé ce commentaire utile 
1.0 étoiles sur 5 Written in a hurry - one of the worst books on security 6 avril 2013
Par PA - Publié sur Amazon.com
Format:Broché
Agreed, Dieter Gollmann is very reputed and knowledgeable. But this book is written in a hurry. Probably, he started writing the book three weeks before the deadline. There is no flow of material. Random "summary" sections. There are two ways to describe anything in security. Someone can be very technical or very descriptive. For example, if some one wants to explain a cryptology technique, they can be totally mathematical or they can be totally discriptive or if you have time and space (and scope of the book) do both. In this book he does a half baked job of both. Even very interesting and engaging topics like public key cryptography are explained horribly. The initial price of this book in three digit amount is just total waste of money. Even at the current two digit price it is a waste of money. The book coverage is so random and without a flow, the learner is better off perusing wikipedia.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?