Singh, 2011 - Google Patents
Network Security and ManagementSingh, 2011
- Document ID
- 6250389916306813542
- Author
- Singh B
- Publication year
External Links
Snippet
Written in an easy-to-understand style, this textbook, now in its third edition, continues to discuss in detail important concepts and major developments in network security and management. It is designed for a one-semester course for undergraduate students of …
- 238000005516 engineering process 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/009—Trust
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stallings | Network security essentials: applications and standards | |
Shirey | RFC 4949: Internet Security Glossary, Version 2 | |
Shirey | Internet security glossary, version 2 | |
Cooper et al. | Computer and communications security | |
Kissel | Glossary of key information security terms | |
Swire et al. | Encryption and globalization | |
van Oorschot | Computer Security and the Internet | |
Canavan | Fundamentals of network security | |
William | Cryptography and network security: For VTU | |
Obaidat et al. | Security of E-systems and Computer Networks | |
Singh | Network Security and Management | |
Stallings | Information privacy engineering and privacy by design: Understanding privacy threats, technology, and regulations based on standards and best practices | |
William | Computer security: Principles and practice | |
Singh et al. | Information security: Components and techniques | |
Elmanaseer et al. | Cybersecurity for administrative facilities | |
Verma et al. | Applications of Data Security and Blockchain in Smart City Identity Management | |
Triantafyllou et al. | Towards an anonymous incident communication channel for electric smart grids | |
Gordon et al. | Cybersecurity & the Courthouse: safeguarding the judicial process | |
Kanaga Priya et al. | Various Attacks on the Implementation of Cryptographic Algorithms | |
Krutz et al. | The CISM prep Guide: Mastering the five Domains of Information security management | |
Algamdi | Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems | |
Nasiruddin et al. | AA Review On Study Of Cyber Security And Cryptography | |
Cernov | Security in Computer Networks | |
Domingo-Ferrer et al. | Canvas white paper 4–technological challenges in cybersecurity | |
Shandilya et al. | Cryptography Background |