Vax Security
Protecting the System and the Data
Seiten
1991
John Wiley & Sons Inc (Verlag)
978-0-471-51507-4 (ISBN)
John Wiley & Sons Inc (Verlag)
978-0-471-51507-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
With the advent of computer hackers and the spread of disruptive viruses, the integrity and confidentiality of data is increasingly at risk. This book aims to educate VAX owners and users about system security hazards, showing how to spot, fix and guard against the "holes" in VMS systems.
With the advent of unethical computer hackers and the spread of highly disruptive viruses, the integrity and confidentiality of data is increasingly at risk. Written to educate VAX owners and users about system security hazards, this volume shows how to spot, fix and guard against the "holes" in VMS systems which can jeopardize programs, data and overall system security. The text offers safety guidelines for VAX systems with remote dial-in communications capabilities, shows how to guard against all types of security violation attempts from in-house users and provides a comprehensive listing of available security products and services.
With the advent of unethical computer hackers and the spread of highly disruptive viruses, the integrity and confidentiality of data is increasingly at risk. Written to educate VAX owners and users about system security hazards, this volume shows how to spot, fix and guard against the "holes" in VMS systems which can jeopardize programs, data and overall system security. The text offers safety guidelines for VAX systems with remote dial-in communications capabilities, shows how to guard against all types of security violation attempts from in-house users and provides a comprehensive listing of available security products and services.
What Is Security; Reasons for Security; Computer Viruses; Hackers in Your System; The Beginnings of Security Policy; Types of Security; Limiting Access; System Restrictions: Products and Procedures; Network Security; Fundamentals of Security; Appendix; Index.
Erscheint lt. Verlag | 24.1.1991 |
---|---|
Zusatzinfo | Ill. |
Verlagsort | New York |
Sprache | englisch |
Maße | 43 x 62 mm |
Gewicht | 567 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Informatik ► Weitere Themen ► Hardware | |
ISBN-10 | 0-471-51507-8 / 0471515078 |
ISBN-13 | 978-0-471-51507-4 / 9780471515074 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €