Software and hardware protection of information. Tutorial
Please sign in so that we can notify you about a reply
The textbook is devoted to the methods and means of software and hardware protection of information and the features of their application to ensure information security of computer systems and networks.
Methods and means of identifying and authentication of subjects of computer systems, distinguishing their access to objects of the Constitutional Court, audit of their actions in the computer system. The information protection tools that are part of the Microsoft Windows operating systems, the Unix clone and IBM as/400 servers are analyzed.
Cryptographic information protection tools that are part of the Microsoft Windows and UNIX clone, and hardware encoders are also considered. In conclusion, software and software and hardware means of protecting information resources of computer systems and networks from malicious programs and unauthorized copying.
Designed for students of higher educational institutions studying in the areas of "Information Security" and "Informatics and Computing Technology", and can be useful to students, graduate students, listeners of advanced training and retraining systems of specialists who are interested in information security issues.
2nd edition, corrected and supplemented
Methods and means of identifying and authentication of subjects of computer systems, distinguishing their access to objects of the Constitutional Court, audit of their actions in the computer system. The information protection tools that are part of the Microsoft Windows operating systems, the Unix clone and IBM as/400 servers are analyzed.
Cryptographic information protection tools that are part of the Microsoft Windows and UNIX clone, and hardware encoders are also considered. In conclusion, software and software and hardware means of protecting information resources of computer systems and networks from malicious programs and unauthorized copying.
Designed for students of higher educational institutions studying in the areas of "Information Security" and "Informatics and Computing Technology", and can be useful to students, graduate students, listeners of advanced training and retraining systems of specialists who are interested in information security issues.
2nd edition, corrected and supplemented
Author:
Author:Khorev Pavel
Cover:
Cover:Hard
Category:
- Category:Arts & Photography
- Category:Computer & Technology
- Category:Engineering & Transportation
- Category:Medical Books
- Category:Agriculture
Publication language:
Publication Language:Russian
Paper:
Paper:Offset
Series:
Series: Higher Education
ISBN:
ISBN:978-5-00091-709-1
No reviews found