Condizione: Very Good. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Condizione: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condizione: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condizione: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Condizione: acceptable. Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may be missing bundled media.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 11,06
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 11,06
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 18,72
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 18,72
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2011
ISBN 10: 3845414790 ISBN 13: 9783845414799
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 51,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2011
ISBN 10: 3845414790 ISBN 13: 9783845414799
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 47,02
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing 2011-08-04, 2011
ISBN 10: 3845414790 ISBN 13: 9783845414799
Da: Chiron Media, Wallingford, Regno Unito
EUR 44,68
Quantità: 10 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Editore: Independently published
Da: Mad Hatter, West Kelowna, BC, Canada
EUR 26,58
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. Time-Based Security in a Nutshell, The model for Time Based Security (TBS) originated with conversations with Bob Ayers, formerly of the Defense Information Systems Agency (DISA) over a period of years. As a result of many napkin drawings, especially in Warsaw, Poland, TBS was born. In the two years since we spent hours and days arguing over the principles, I have had the opportunity to develop TBS into a workable mathematical model for the quantification of security. I have always maintained that to offer a reasonable defense, one has to know how to attack networks. So, TBS, here we go. Defensive Products Do Not and Cannot Work. The current and prevalent method to defend networks against attack is an approach 10,000 years old based upon classic military build your defensive walls as high as you can to keep the bad guys out. This is also known as Fortress Mentality. However, it hasn't worked since the dawn of time and still doesn't; work. Consider Odysseus and the Greeks camped themselves out on the plains of Troy for nine years before they screamed, We give up! And here's a horse as a present. We all know the results. The Great Wall of China was meant to keep the marauding Mongolians at bay yet advanced technology like the catapult, battering ram, and bribery of guards won out. The Maginot Line; the Berlin none of them worked because they couldn't. This fundamental error in historical judgment, though, was what modern defensive information security was based how can we build the walls around our networks high enough to keep the bad guys out. Oops! Wrong again. They began with the false premise that they could keep the bad guys out and then compounded the error in the erroneous belief that everyone who had access to the networks was already cleared as a good guy; a pro-US gung-ho Marine-like good guy. However, this incorrect model was based on other antique computers operating in isolation there is no such thing as a network. When the Trojans let the drawbridge to their city descend to admit the horse, they were networking with the outside world. When the Germans bypassed the Maginot Line, they created a network with the French right or wrong. When people sailed over or around the Berlin Wall, a network connection was made. Thus, the principle of Fortress Mentality began to collapse as a viable defensive posture. When the security pioneers began to develop security models, they took a similar approach because the network had not yet begun to live and expand as an independent entity. And then the hackers started at us. So, based on the antiquated model of Fortress Mentality, our network defense program began. And the result? Use firewalls. Use passwords. Use Access Control Tables. But now A lot of people have made a lot of money selling both the government and the private sector tons of firewalls and other protective equipment to defend their networks. Sound like a plan, right? Well, maybe it isn't. Name one company that guarantees their product! Name one company that will provide a warranty that if you use their products, they will legally accept responsibility for any losses you suffer if their products are compromised. Never mind that some of the most popular defensive products are created by foreign government-sponsored organizations which do not release source code on how their products work.
Paperback. Condizione: new. New Copy. Customer Service Guaranteed.
paperback. Condizione: New. In shrink wrap. Looks like an interesting title!
Condizione: New.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2026
ISBN 10: 6209415369 ISBN 13: 9786209415364
Da: preigu, Osnabrück, Germania
EUR 39,35
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. FROM COMPLIANCE AUDIT TO CONTINUOUS CONTROL | IMPLEMENTING AI-BASED SECURITY POSTURE MANAGEMENT TO ENSURE REAL-TIME ADHERENCE TO NIST CYBERSECURITY FRAMEWORKS | Chukwunenye Amadi | Taschenbuch | Englisch | 2026 | LAP LAMBERT Academic Publishing | EAN 9786209415364 | Verantwortliche Person für die EU: SIA OmniScriptum Publishing, Brivibas Gatve 197, 1039 RIGA, LETTLAND, customerservice[at]vdm-vsg[dot]de | Anbieter: preigu.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3848448548 ISBN 13: 9783848448548
Da: preigu, Osnabrück, Germania
EUR 43,30
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. SSL based implementation of RFC2289 with dual factor token using GSM | Enhanced Security Using One Time Password System | Jerrin Yomas | Taschenbuch | 76 S. | Englisch | 2012 | LAP LAMBERT Academic Publishing | EAN 9783848448548 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2011
ISBN 10: 3845414790 ISBN 13: 9783845414799
Da: preigu, Osnabrück, Germania
EUR 43,30
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. FPGA Based Network Security Architecture for High Speed Networks | Design and Implementation of efficient architectures of time critical modules in FPGA for High Speed Network Application | Sourav Mukherjee (u. a.) | Taschenbuch | 80 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783845414799 | Verantwortliche Person für die EU: OmniScriptum GmbH & Co. KG, Bahnhofstr. 28, 66111 Saarbrücken, info[at]akademikerverlag[dot]de | Anbieter: preigu.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2011
ISBN 10: 3845414790 ISBN 13: 9783845414799
Da: Rarewaves.com UK, London, Regno Unito
EUR 47,78
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 129,35
Quantità: 10 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2011
ISBN 10: 3845414790 ISBN 13: 9783845414799
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 122,82
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition.