ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computer Security: Art and Science

دانلود کتاب امنیت کامپیوتر: هنر و علم

Computer Security: Art and Science

مشخصات کتاب

Computer Security: Art and Science

دسته بندی: کامپیوتر
ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 0203301528 
ناشر: Addison-Wesley Professional 
سال نشر: 2002 
تعداد صفحات: 1154 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 8 مگابایت 

قیمت کتاب (تومان) : 30,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 12


در صورت تبدیل فایل کتاب Computer Security: Art and Science به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب امنیت کامپیوتر: هنر و علم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب امنیت کامپیوتر: هنر و علم

اهمیت امنیت کامپیوتر در چند سال گذشته به طور چشمگیری افزایش یافته است. بیشاپ یک مرجع تاریخی برای تئوری و عمل امنیت رایانه ارائه می دهد. این کتاب درسی برای استفاده در مقاطع کارشناسی ارشد و مقدماتی کارشناسی ارشد، دوره های آموزشی غیر دانشگاهی و همچنین مرجع و خودآموزی برای متخصصان امنیت در نظر گرفته شده است. از نظر دامنه جامع، عناصر کاربردی و عملی، تئوری و دلایل طراحی برنامه‌ها و تکنیک‌های امنیتی را پوشش می‌دهد. Bishop به مسائل مدیریت و مهندسی کامپیوتر می پردازد. مثال‌های عالی از ایده‌ها و مکانیسم‌ها نشان می‌دهند که چگونه تکنیک‌ها و اصول متفاوت در سیستم‌های پرکاربرد ترکیب می‌شوند (یا نه). دارای تقطیر تعداد زیادی از مقالات کنفرانس، پایان نامه ها و کتاب هایی است که در طول سال ها ظاهر شده اند و ترکیب ارزشمندی را ارائه می دهند. این کتاب به دلیل گستردگی، نگارش واضح و شفاف، و ترکیب جنبه‌های رسمی و نظری با سیستم‌ها، فناوری‌ها، تکنیک‌ها و سیاست‌های واقعی، تحسین‌شده است.


توضیحاتی درمورد کتاب به خارجی

The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.



فهرست مطالب

Computer Security: Art and Science......Page 1
Local Disk......Page 0
Computer Security: Art and Science......Page 3
Computer Security: Art and Science......Page 14
Computer Security: Art and Science......Page 81
Computer Security: Art and Science......Page 82
Computer Security: Art and Science......Page 85
Computer Security: Art and Science......Page 86
Computer Security: Art and Science......Page 87
Computer Security: Art and Science......Page 91
Computer Security: Art and Science......Page 93
Computer Security: Art and Science......Page 95
Computer Security: Art and Science......Page 97
Computer Security: Art and Science......Page 100
Computer Security: Art and Science......Page 104
Computer Security: Art and Science......Page 106
Computer Security: Art and Science......Page 108
Computer Security: Art and Science......Page 109
Computer Security: Art and Science......Page 110
Computer Security: Art and Science......Page 111
Computer Security: Art and Science......Page 117
Computer Security: Art and Science......Page 122
Computer Security: Art and Science......Page 124
Computer Security: Art and Science......Page 125
Computer Security: Art and Science......Page 126
Computer Security: Art and Science......Page 127
Computer Security: Art and Science......Page 129
Computer Security: Art and Science......Page 130
Computer Security: Art and Science......Page 132
Computer Security: Art and Science......Page 137
Computer Security: Art and Science......Page 150
Computer Security: Art and Science......Page 163
Computer Security: Art and Science......Page 177
Computer Security: Art and Science......Page 178
Computer Security: Art and Science......Page 179
Computer Security: Art and Science......Page 180
Computer Security: Art and Science......Page 182
Computer Security: Art and Science......Page 183
Computer Security: Art and Science......Page 187
Computer Security: Art and Science......Page 188
Computer Security: Art and Science......Page 190
Computer Security: Art and Science......Page 192
Computer Security: Art and Science......Page 194
Computer Security: Art and Science......Page 196
Computer Security: Art and Science......Page 203
Computer Security: Art and Science......Page 206
Computer Security: Art and Science......Page 211
Computer Security: Art and Science......Page 212
Computer Security: Art and Science......Page 213
Computer Security: Art and Science......Page 214
Computer Security: Art and Science......Page 215
Computer Security: Art and Science......Page 234
Computer Security: Art and Science......Page 236
Computer Security: Art and Science......Page 241
Computer Security: Art and Science......Page 242
Computer Security: Art and Science......Page 243
Computer Security: Art and Science......Page 244
Computer Security: Art and Science......Page 246
Computer Security: Art and Science......Page 247
Computer Security: Art and Science......Page 249
Computer Security: Art and Science......Page 253
Computer Security: Art and Science......Page 257
Computer Security: Art and Science......Page 262
Computer Security: Art and Science......Page 263
Computer Security: Art and Science......Page 264
Computer Security: Art and Science......Page 265
Computer Security: Art and Science......Page 267
Computer Security: Art and Science......Page 268
Computer Security: Art and Science......Page 276
Computer Security: Art and Science......Page 279
Computer Security: Art and Science......Page 281
Computer Security: Art and Science......Page 284
Computer Security: Art and Science......Page 285
Computer Security: Art and Science......Page 286
Computer Security: Art and Science......Page 287
Computer Security: Art and Science......Page 289
Computer Security: Art and Science......Page 290
Computer Security: Art and Science......Page 294
Computer Security: Art and Science......Page 306
Computer Security: Art and Science......Page 309
Computer Security: Art and Science......Page 313
Computer Security: Art and Science......Page 316
Computer Security: Art and Science......Page 317
Computer Security: Art and Science......Page 318
Computer Security: Art and Science......Page 319
Computer Security: Art and Science......Page 320
Computer Security: Art and Science......Page 321
Computer Security: Art and Science......Page 323
Computer Security: Art and Science......Page 338
Computer Security: Art and Science......Page 343
Computer Security: Art and Science......Page 346
Computer Security: Art and Science......Page 347
Computer Security: Art and Science......Page 348
Computer Security: Art and Science......Page 349
Computer Security: Art and Science......Page 352
Computer Security: Art and Science......Page 353
Computer Security: Art and Science......Page 354
Computer Security: Art and Science......Page 356
Computer Security: Art and Science......Page 363
Computer Security: Art and Science......Page 365
Computer Security: Art and Science......Page 372
Computer Security: Art and Science......Page 377
Computer Security: Art and Science......Page 381
Computer Security: Art and Science......Page 382
Computer Security: Art and Science......Page 383
Computer Security: Art and Science......Page 384
Computer Security: Art and Science......Page 385
Computer Security: Art and Science......Page 387
Computer Security: Art and Science......Page 394
Computer Security: Art and Science......Page 397
Computer Security: Art and Science......Page 417
Computer Security: Art and Science......Page 418
Computer Security: Art and Science......Page 419
Computer Security: Art and Science......Page 420
Computer Security: Art and Science......Page 422
Computer Security: Art and Science......Page 423
Computer Security: Art and Science......Page 425
Computer Security: Art and Science......Page 428
Computer Security: Art and Science......Page 442
Computer Security: Art and Science......Page 446
Computer Security: Art and Science......Page 449
Computer Security: Art and Science......Page 450
Computer Security: Art and Science......Page 452
Computer Security: Art and Science......Page 453
Computer Security: Art and Science......Page 454
Computer Security: Art and Science......Page 455
Computer Security: Art and Science......Page 456
Computer Security: Art and Science......Page 458
Computer Security: Art and Science......Page 465
Computer Security: Art and Science......Page 466
Computer Security: Art and Science......Page 467
Computer Security: Art and Science......Page 468
Computer Security: Art and Science......Page 470
Computer Security: Art and Science......Page 471
Computer Security: Art and Science......Page 472
Computer Security: Art and Science......Page 474
Computer Security: Art and Science......Page 476
Computer Security: Art and Science......Page 478
Computer Security: Art and Science......Page 479
Computer Security: Art and Science......Page 487
Computer Security: Art and Science......Page 498
Computer Security: Art and Science......Page 499
Computer Security: Art and Science......Page 500
Computer Security: Art and Science......Page 501
Computer Security: Art and Science......Page 502
Computer Security: Art and Science......Page 510
Computer Security: Art and Science......Page 516
Computer Security: Art and Science......Page 521
Computer Security: Art and Science......Page 523
Computer Security: Art and Science......Page 525
Computer Security: Art and Science......Page 526
Computer Security: Art and Science......Page 527
Computer Security: Art and Science......Page 528
Computer Security: Art and Science......Page 530
Computer Security: Art and Science......Page 531
Computer Security: Art and Science......Page 534
Computer Security: Art and Science......Page 541
Computer Security: Art and Science......Page 555
Computer Security: Art and Science......Page 560
Computer Security: Art and Science......Page 563
Computer Security: Art and Science......Page 564
Computer Security: Art and Science......Page 565
Computer Security: Art and Science......Page 566
Computer Security: Art and Science......Page 568
Computer Security: Art and Science......Page 569
Computer Security: Art and Science......Page 572
Computer Security: Art and Science......Page 576
Computer Security: Art and Science......Page 600
Computer Security: Art and Science......Page 601
Computer Security: Art and Science......Page 602
Computer Security: Art and Science......Page 603
Computer Security: Art and Science......Page 606
Computer Security: Art and Science......Page 607
Computer Security: Art and Science......Page 614
Computer Security: Art and Science......Page 621
Computer Security: Art and Science......Page 622
Computer Security: Art and Science......Page 623
Computer Security: Art and Science......Page 624
Computer Security: Art and Science......Page 626
Computer Security: Art and Science......Page 627
Computer Security: Art and Science......Page 638
Computer Security: Art and Science......Page 658
Computer Security: Art and Science......Page 668
Computer Security: Art and Science......Page 669
Computer Security: Art and Science......Page 670
Computer Security: Art and Science......Page 671
Computer Security: Art and Science......Page 672
Computer Security: Art and Science......Page 673
Computer Security: Art and Science......Page 674
Computer Security: Art and Science......Page 677
Computer Security: Art and Science......Page 680
Computer Security: Art and Science......Page 687
Computer Security: Art and Science......Page 696
Computer Security: Art and Science......Page 697
Computer Security: Art and Science......Page 698
Computer Security: Art and Science......Page 699
Computer Security: Art and Science......Page 700
Computer Security: Art and Science......Page 701
Computer Security: Art and Science......Page 703
Computer Security: Art and Science......Page 704
Computer Security: Art and Science......Page 705
Computer Security: Art and Science......Page 706
Computer Security: Art and Science......Page 707
Computer Security: Art and Science......Page 713
Computer Security: Art and Science......Page 718
Computer Security: Art and Science......Page 720
Computer Security: Art and Science......Page 721
Computer Security: Art and Science......Page 723
Computer Security: Art and Science......Page 725
Computer Security: Art and Science......Page 737
Computer Security: Art and Science......Page 740
Computer Security: Art and Science......Page 741
Computer Security: Art and Science......Page 742
Computer Security: Art and Science......Page 743
Computer Security: Art and Science......Page 745
Computer Security: Art and Science......Page 747
Computer Security: Art and Science......Page 755
Computer Security: Art and Science......Page 757
Computer Security: Art and Science......Page 759
Computer Security: Art and Science......Page 764
Computer Security: Art and Science......Page 773
Computer Security: Art and Science......Page 774
Computer Security: Art and Science......Page 775
Computer Security: Art and Science......Page 776
Computer Security: Art and Science......Page 778
Computer Security: Art and Science......Page 789
Computer Security: Art and Science......Page 792
Computer Security: Art and Science......Page 806
Computer Security: Art and Science......Page 811
Computer Security: Art and Science......Page 812
Computer Security: Art and Science......Page 813
Computer Security: Art and Science......Page 814
Computer Security: Art and Science......Page 817
Computer Security: Art and Science......Page 818
Computer Security: Art and Science......Page 819
Computer Security: Art and Science......Page 820
Computer Security: Art and Science......Page 822
Computer Security: Art and Science......Page 825
Computer Security: Art and Science......Page 832
Computer Security: Art and Science......Page 836
Computer Security: Art and Science......Page 839
Computer Security: Art and Science......Page 846
Computer Security: Art and Science......Page 849
Computer Security: Art and Science......Page 850
Computer Security: Art and Science......Page 851
Computer Security: Art and Science......Page 852
Computer Security: Art and Science......Page 853
Computer Security: Art and Science......Page 856
Computer Security: Art and Science......Page 859
Computer Security: Art and Science......Page 874
Computer Security: Art and Science......Page 880
Computer Security: Art and Science......Page 885
Computer Security: Art and Science......Page 895
Computer Security: Art and Science......Page 896
Computer Security: Art and Science......Page 898
Computer Security: Art and Science......Page 899
Computer Security: Art and Science......Page 900
Computer Security: Art and Science......Page 901
Computer Security: Art and Science......Page 906
Computer Security: Art and Science......Page 919
Computer Security: Art and Science......Page 923
Computer Security: Art and Science......Page 925
Computer Security: Art and Science......Page 926
Computer Security: Art and Science......Page 927
Computer Security: Art and Science......Page 928
Computer Security: Art and Science......Page 932
Computer Security: Art and Science......Page 933
Computer Security: Art and Science......Page 934
Computer Security: Art and Science......Page 935
Computer Security: Art and Science......Page 936
Computer Security: Art and Science......Page 939
Computer Security: Art and Science......Page 945
Computer Security: Art and Science......Page 951
Computer Security: Art and Science......Page 957
Computer Security: Art and Science......Page 960
Computer Security: Art and Science......Page 966
Computer Security: Art and Science......Page 971
Computer Security: Art and Science......Page 973
Computer Security: Art and Science......Page 974
Computer Security: Art and Science......Page 975
Computer Security: Art and Science......Page 976
Computer Security: Art and Science......Page 983
Computer Security: Art and Science......Page 991
Computer Security: Art and Science......Page 996
Computer Security: Art and Science......Page 998
Computer Security: Art and Science......Page 999
Computer Security: Art and Science......Page 1000
Computer Security: Art and Science......Page 1001
Computer Security: Art and Science......Page 1003
Computer Security: Art and Science......Page 1004
Computer Security: Art and Science......Page 1005
Computer Security: Art and Science......Page 1006
Computer Security: Art and Science......Page 1007
Computer Security: Art and Science......Page 1009
Computer Security: Art and Science......Page 1013
Computer Security: Art and Science......Page 1020
Computer Security: Art and Science......Page 1027
Computer Security: Art and Science......Page 1051
Computer Security: Art and Science......Page 1055
Computer Security: Art and Science......Page 1057
Computer Security: Art and Science......Page 1058
Computer Security: Art and Science......Page 1059
Computer Security: Art and Science......Page 1060
Computer Security: Art and Science......Page 1062
Computer Security: Art and Science......Page 1063
Computer Security: Art and Science......Page 1064
Computer Security: Art and Science......Page 1065
Computer Security: Art and Science......Page 1067
Computer Security: Art and Science......Page 1069
Computer Security: Art and Science......Page 1070
Computer Security: Art and Science......Page 1071
Computer Security: Art and Science......Page 1072
Computer Security: Art and Science......Page 1073
Computer Security: Art and Science......Page 1076
Computer Security: Art and Science......Page 1078
Computer Security: Art and Science......Page 1081
Computer Security: Art and Science......Page 1082
Computer Security: Art and Science......Page 1083
Computer Security: Art and Science......Page 1084
Computer Security: Art and Science......Page 1088
Computer Security: Art and Science......Page 1089
Computer Security: Art and Science......Page 1090
Computer Security: Art and Science......Page 1096
Computer Security: Art and Science......Page 1098
Computer Security: Art and Science......Page 1101
Computer Security: Art and Science......Page 1103
Computer Security: Art and Science......Page 1104
Computer Security: Art and Science......Page 1128
Computer Security: Art and Science......Page 1131
Computer Security: Art and Science......Page 1133
Computer Security: Art and Science......Page 1135
Computer Security: Art and Science......Page 1137
Computer Security: Art and Science......Page 1139
Computer Security: Art and Science......Page 1143
Computer Security: Art and Science......Page 1144
Computer Security: Art and Science......Page 1145
Computer Security: Art and Science......Page 1146
Computer Security: Art and Science......Page 1147
Computer Security: Art and Science......Page 1148
Computer Security: Art and Science......Page 1149
Computer Security: Art and Science......Page 1150
Computer Security: Art and Science......Page 1151
Computer Security: Art and Science......Page 1152
Computer Security: Art and Science......Page 1153
Computer Security: Art and Science......Page 1154




نظرات کاربران