Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Vulnerability analysis on the comput...
~
Ali, Firkhan Ali Hamid.
Linked to FindBook
Google Book
Amazon
博客來
Vulnerability analysis on the computer network security : = implementation and practices /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Vulnerability analysis on the computer network security :/ Firkhan Ali Hamid Ali.
Reminder of title:
implementation and practices /
Author:
Ali, Firkhan Ali Hamid.
Published:
Saarbrücken, Germany :Lambert Academic Pub., : 2010.,
Description:
vii, 57 p. :ill. ;22 cm.
Subject:
Computer networks - Congresses. - Security measures -
ISBN:
9783838347608 (pbk.) :
Vulnerability analysis on the computer network security : = implementation and practices /
Ali, Firkhan Ali Hamid.
Vulnerability analysis on the computer network security :
implementation and practices /Firkhan Ali Hamid Ali. - Saarbrücken, Germany :Lambert Academic Pub.,2010. - vii, 57 p. :ill. ;22 cm.
Includes bibliographical references (p. 55-57).
"Exploitation by attackers whose have breached the computer network security of some of the world's most venerable institutions and organization had become increased every year. Within this type of attention, computer network security has gone from the as an extra services to the main services in a relatively short period of a time. The main purpose is to mitigate security risk and assure that their digital assets are safe and secure. Then, digital environment is become a better condition to the every body especially for business activities. Vulnerability analysis activities can help to identify the weaknesses and vulnerabilities in the computer network system that assists IT person to prevent the attacks against it by the hackers or crackers. " -- p. [4] of cover.
ISBN: 9783838347608 (pbk.) :EUR49Subjects--Topical Terms:
1244118
Computer networks
--Security measures--Congresses.
Vulnerability analysis on the computer network security : = implementation and practices /
LDR
:01287cam a22001454a 450
001
998318
005
20111027122713.0
008
120214s2010 gw a b 000 0 eng d
020
$a
9783838347608 (pbk.) :
$c
EUR49
035
$a
SI-BW-100-06
040
$a
NDHU
$b
eng
100
1
$a
Ali, Firkhan Ali Hamid.
$3
1324264
245
1 0
$a
Vulnerability analysis on the computer network security :
$b
implementation and practices /
$c
Firkhan Ali Hamid Ali.
260
#
$a
Saarbrücken, Germany :
$b
Lambert Academic Pub.,
$c
2010.
300
$a
vii, 57 p. :
$b
ill. ;
$c
22 cm.
504
$a
Includes bibliographical references (p. 55-57).
520
#
$a
"Exploitation by attackers whose have breached the computer network security of some of the world's most venerable institutions and organization had become increased every year. Within this type of attention, computer network security has gone from the as an extra services to the main services in a relatively short period of a time. The main purpose is to mitigate security risk and assure that their digital assets are safe and secure. Then, digital environment is become a better condition to the every body especially for business activities. Vulnerability analysis activities can help to identify the weaknesses and vulnerabilities in the computer network system that assists IT person to prevent the attacks against it by the hackers or crackers. " -- p. [4] of cover.
650
# 0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
1244118
650
# 0
$a
Computer security.
$3
540555
based on 0 review(s)
Location:
ALL
六樓西文書區HC-Z(6F Western Language Books)
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W0008687
六樓西文書區HC-Z(6F Western Language Books)
01.外借(書)_YB
一般圖書
QA76.9.A25 A45 2010
一般使用(Normal)
On shelf
0
Reserve
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login