找到
136
篇与
SHOP
相关的结果
- 第 21 页
-
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th Edition William Stallings You are buying Test Bank for Network Security Essentials Applications and Standards, 5/E 5th Edition William Stallings Product details: Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist). A practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards , Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Table of contents: Online ResourcesPrefaceAbout the AuthorChapter 1 Introduction 1.1 Computer Security Concepts1.2 The OSI Security Architecture1.3 Security Attacks1.4 Security Services1.5 Security Mechanisms1.6 A Model for Network Security1.7 Standards1.8 Outline of This Book1.9 Recommended Reading1.10 Internet and Web Resources1.11 Key Terms, Review Questions, and ProblemsPART ONE CRYPTOGRAPHYChapter 2 Symmetric Encryption and Message Confidentiality 2.1 Symmetric Encryption Principles2.2 Symmetric Block Encryption Algorithms2.3 Random and Pseudorandom Numbers2.4 Stream Ciphers and RC42.5 Cipher Block Modes of Operation2.6 Recommended Reading2.7 Key Terms, Review Questions, and ProblemsChapter 3 Public-Key Cryptography and Message Authentication 3.1 Approaches to Message Authentication3.2 Secure Hash Functions3.3 Message Authentication Codes3.4 Public Key Cryptography Principles3.5 Public-Key Cryptography Algorithms3.6 Digital Signatures3.7 Recommended Reading3.8 Key Terms, Review Questions, and ProblemsPART TWO NETWORK SECURITY APPLICATIONSChapter 4 Key Distribution and User Authentication 4.1 Symmetric Key Distribution Using Symmetric Encryption4.2 Kerberos4.3 Key Distribution Using Asymmetric Encryption4.4 X.509 Certificates4.5 Public Key Infrastructure4.6 Federated Identity Management4.7 Recommended Reading4.8 Key Terms, Review Questions, and ProblemsChapter 5 Network Access Control and Cloud Security 5.1 Network Access Control5.2 Extensible Authentication Protocol5.3 IEEE 802.1X Port-Based Network Access Control5.4 Cloud Computing5.5 Cloud Security Risks and Countermeasures5.6 Data Protection in the Cloud5.7 Cloud Security as a Service5.8 Recommended Reading5.9 Key Terms, Review Questions, and ProblemsChapter 6 Transport-Level Security 6.1 Web Security Issues6.2 Secure Sockets Layer (SSL)6.3 Transport Layer Security (TLS)6.4 HTTPS6.5 Secure Shell (SSH)6.6 Recommended Reading6.7 Key Terms, Review Questions, and ProblemsChapter 7 Wireless Network Security 7.1 Wireless Security7.2 Mobile Device Security7.3 IEEE 802.11 Wireless LAN Overview7.4 IEEE 802.11i Wireless LAN Security7.5 Recommended Reading7.6 Key Terms, Review Questions, and ProblemsChapter 8 Electronic Mail Security 8.1 Pretty Good Privacy (PGP)8.2 S/MIME8.3 DomainKeys Identified Mail (DKIM)8.4 Recommended Web Sites8.5 Key Terms, Review Questions, and ProblemsChapter 9 IP Security 9.1 IP Security Overview9.2 IP Security Policy9.3 Encapsulating Security Payload9.4 Combining Security Associations9.5 Internet Key Exchange9.6 Cryptographic Suites9.7 Recommended Reading9.8 Key Terms, Review Questions, and ProblemsPART THREE SYSTEM SECURITYChapter 10 Malicious Software 10.1 Types of Malicious Software10.2 Propagation – Infected Content – Viruses10.3 Propagation – Vulnerability Exploit – Worms10.4 Propagation – Social Engineering – SPAM, Trojans10.5 Payload – System Corruption10.6 Payload – Attack Agent – Zombie, Bots10.7 Payload – Information Theft – Keyloggers, Phishing, Spyware10.8 Payload – Stealthing – Backdoors, Rootkits10.9 Countermeasures10.10 Distributed Denial of Service Attacks10.11 Recommended Reading10.12 Key Terms, Review Questions, and ProblemsChapter 11 Intruders 11.1 Intruders11.2 Intrusion Detection11.3 Password Management11.4 Recommended Reading11.5 Key Terms, Review Questions, and ProblemsChapter 12 Firewalls 12.1 The Need for Firewalls12.2 Firewall Characteristics12.3 Types of Firewalls12.4 Firewall Basing12.5 Firewall Location and Configurations12.6 Recommended Reading12.7 Key Terms, Review Questions, and ProblemsAPPENDICESAppendix A Some Aspects of Number Theory A.1 Prime and Relatively Prime NumbersA.2 Modular ArithmeticAppendix B Projects for Teaching Network Security B.1 Research ProjectsB.2 Hacking ProjectB.3 Programming ProjectsB.4 Laboratory ExercisesB.5 Practical Security AssessmentsB.6 Writing AssignmentsB.7 Reading/Report AssignmentsREFERENCESINDEXONLINE CHAPTERS AND APPENDICES – Online chapters, appendices, and other documents are Premium Content. Students must use the access card located in the front of the book to register and access the online premium content. If there is no access card, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.â€� Instructors must register on the site to access the material.Chapter 13 Network Management Security 13.1 Basic Concepts of SNMP13.2 SNMPv1 Community Facility13.3 SNMPv313.4 Recommended Reading13.5 Key Terms, Review Questions, and ProblemsChapter 14 Legal and Ethical Issues 14.1 Cybercrime and Computer Crime14.2 Intellectual Property14.3 Privacy14.4 Ethical Issues14.5 Recommended Reading14.6 Key Terms, Review Questions, and ProblemsChapter 15 SHA-3 15.1 Evaluation Criteria for SHA-315.2 The SHA-3 Algorithm15.3 Recommended Reading15.4 Key Terms and Review QuestionsAppendix C Standards and Standards-Setting Organizations C.1 The Importance of StandardsC.2 Internet Standards and the Internet SocietyC.3 National Institute of Standards and TechnologyAppendix D TCP/IP and OSI D.1 Protocols and Protocol ArchitecturesD.2 The TCP/IP Protocol ArchitectureD.3 The Role of an Internet ProtocolD.4 IPv4D.5 IPv6D.6 The OSI Protocol ArchitectureAppendix E Pseudorandom Number Generation E.1 PRNG RequirementsE.2 PRNG Using a Block CipherE.3 PRNG Using a Hash Function or Message Authentication CodeAppendix F Kerberos Encryption Techniques F.1 Password-to-Key TransformationF.2 Propagating Cipher Block Chaining ModeAppendix G Data Compression Using ZIP G.1 Compression AlgorithmG.2 Decompression AlgorithmAppendix H More on PGP H.1 True Random NumbersH.2 Pseudorandom NumbersH.3 Cryptographic Keys and Key RingsH.4 Public-Key ManagementAppendix I The International Reference AlphabetAppendix J The Base-Rate FallacyAppendix K Radix-64 ConversionGLOSSARYLIST OF ACRONYMSPeople also search: network security standards list network security essentials applications and standards network security guidelines Download sample free sample download If you need more samples or complete documents, please contact online customer service!
-
Solution Manual for Corporate Finance, 12th Edition, Stephen Ross, Randolph Westerfield, Jeffrey Jaffe Bradford Jordan Solution Manual for Corporate Finance, 12th Edition, Stephen Ross, Randolph Westerfield, Jeffrey Jaffe, Bradford Jordan, Product details: Corporate Finance, by Ross, Westerfield, Jaffe, and Jordan emphasizes the modern fundamentals of the theory of finance, while providing contemporary examples to make the theory come to life. The authors aim to present corporate finance as the working of a small number of integrated and powerful intuitions, rather than a collection of unrelated topics. They develop the central concepts of modern finance: arbitrage, net present value, efficient markets, agency theory, options, and the trade-off between risk and return, and use them to explain corporate finance with a balance of theory and application. The Twelfth Edition includes many exciting new research findings as well as the incorporation of the Tax Cuts and Jobs Act (TCJA) throughout the text. Connect is proven to deliver better results for students and instructors. Proven content integrates seamlessly with enhanced digital tools to create a personalized learning experience that provides students with precisely what they need, when they need it. With Connect, the educational possibilities are limitless. Table of Contents Part I Overview 1 Introduction to Corporate Finance 2 Financial Statements and Cash Flow 3 Financial Statements Analysis and Financial ModelsPart II Valuation and Capital Budgeting 4 Discounted Cash Flow Valuation 5 Net Present Value and Other Investment Rules 6 Making Capital Investment Decisions 7 Risk Analysis, Real Options, and Capital Budgeting 8 Interest Rates and Bond Valuation 9 Stock ValuationPart III Risk 10 Lessons from Market History 11 Return, Risk, and the Capital Asset Pricing Model (CAPM) 12 An Alternative View of Risk and Return: The Arbitrage Pricing Theory 13 Risk, Cost of Capital, and ValuationPart IV Capital Structure and Dividend Policy 14 Efficient Capital Markets and Behavioral Challenges 15 Long-Term Financing 16 Capital Structure: Basic Concepts 17 Capital Structure: Limits to the Use of Debt 18 Valuation and Capital Budgeting for the Levered Firm 19 Dividends and Other PayoutsPart V Long-Term Financing 20 Raising Capital 21 LeasingPart VI Options, Futures, and Corporate Finance 22 Options and Corporate Finance 23 Options and Corporate Finance: Extensions and Applications 24 Warrants and Convertibles 25 Derivatives and Hedging RiskPart VII Short-Term Finance 26 Short-Term Finance and Planning 27 Cash Management 28 Credit and Inventory ManagementPart VIII Special Topics 29 Mergers, Acquisitions, and Divestitures 30 Financial Distress 31 International Corporate FinanceAppendix A: Mathematical Tables Appendix B: Solutions to Selected End-of-Chapter Problems Appendix C: Using the HP 10B and TI BA II Plus Financial CalculatorsPeople also search: principles of corporate finance 12th edition ppt fundamental of corporate finance 12th edition principles of corporate finance 12th edition chapter 4 solutions Download sample free sample download If you need more samples or complete documents, please contact online customer service!
-
Test Bank for Strategic Management, 10th Edition by Hitt This is completed downloadable of Test Bank for Strategic Management, 10th Edition by Hitt Product details: Introduce strategic management using the market-leading text that sets the standard for the most complete, relevant presentation. Written by highly respected experts and prestigious scholars, Hitt/Ireland/Hoskisson’s STRATEGIC MANAGEMENT: COMPETITIVENESS AND GLOBALIZATION, CONCEPTS AND CASES, 10E provides an intellectually rich, yet thoroughly practical analysis of strategic management today. This unique text is the only one to integrate the classic industrial organization model with a resource-based view of the firm to give readers a complete understanding of how today’s businesses use strategic management to establish a sustained competitive advantage. The authors present cutting-edge research and strategic management trends within a strong global focus, using memorable examples from more than 600 companies. A wealth of learning features and selection of 30 all-new compelling cases prepare your students to face the broad range of critical issues confronting contemporary managers. Engaging video cases, CengageNOW online teaching tools, and a complete electronic business library keeps study current and relevant. Table of contents: 1: Adobe Systems Incorporated.2: Apple Inc.: Keeping the “i” in Innovation.3: AT&T.4: Best Buy.5: Chipotle Mexican Grill.6: Coinstar (Redbox).7: Domino’s Pizza: A Case Study in Organizational Evolution.8: Dr Pepper Snapple Group2011: Fighting to Prosper in a Highly Competitive Market.9: Ford Motor Company.10: Google.11: Gore: Developing Global Teams to Meet 21st Century Challenges at W. L. Gore & Associates*.12: Herman Miller: A Case of Reinvention and Renewal.13: Luck Company.14: McDonald’s: From Big Mac to P’tit Plaisir.15: Mellon.16: MGM Resorts International.17: Microsoft Corp.18: Movie Exhibition Industry: The Movie Exhibition Industry:2011.19: Navistar.20: Netflix.21: Porsche.22: Rite Aid Corporation.23: RJ Reynolds.24: Twitter.25: Ultimate Fighting.26: Under Armour.27: Union Pacific.28: Valeant Pharmaceuticals.29: VICTORY: THE NEW AMERICAN MOTORCYCLE CELEBRATES ITS FIRST DECADE ON THE ROAD.30: Zipcar.People also search: strategic management hitt hitt strategic management hitt strategic management Download sample free sample download If you need more samples or complete documents, please contact online customer service!
-
Test Bank for Clinical Laboratory Hematology, 4th Edition, Shirlyn McKenzie, Lynne Williams Test Bank for Clinical Laboratory Hematology, 4th Edition, Shirlyn McKenzie, Lynne Williams is available. Product details: ISBN-13: 9780134709369 Author: Clinical Laboratory Hematology is a comprehensive survey of laboratory hematology balancing theory with practical applications. It’s perfect for students at all levels of an MLT/MLS program (medical lab technician/medical lab science).The text combines detailed technical information with a running case study. This format will help you synthesize and analyze information, answer questions and solve problems, and consider real-world implications. Case Study questions and checkpoints gauge your grasp of concepts from a module.The 4th Edition has been thoroughly updated with the latest advances in laboratory medicine. It has new engaging features, including a new interactive library of nearly 1,200 images.Table of Contents: SECTION 1 1. Introduction 2. Cellular Homeostasis 3. Structure and Function of Hematopoietic Organs SECTION 2 4. Hematopoiesis 5. The Erythrocyte 6. Hemoglobin 7. Granulocytes and Monocytes 8. Lymphocytes 9. The Platelet 10. The Complete Blood Count and Peripheral Blood Smear Evaluation 11. Introduction to Anemia SECTION 3 12. Anemias of Disordered Regulation of Iron Metabolism and Heme Synthesis 13. Hemoglobinopathies: Qualitative Defects 14. Thalassemia 15. Megaloblastic and Nonmegaloblastic Macrocytic Anemias 16. Hypoproliferative Anemias 17. Hemolytic Anemia: Membrane Defects 18. Hemolytic Anemia: Enzyme Deficiencies 19. Hemolytic Anemia: Immune Anemias 20. Hemolytic Anemia: Nonimmune Defects 21. Nonmalignant Disorders of Leukocytes: Granulocytes and Monocytes 22. Nonmalignant Lymphocyte Disorders 23. Introduction to Hematopoietic Neoplasms 24. Myeloproliferative Neoplasms 25. Myelodysplastic Syndromes 26. Acute Myeloid Leukemias 27. Precursor Lymphoid Neoplasms 28. Mature Lymphoid Neoplasms 29. Hematopoietic Stem Cell Transplantation 30. Morphologic Analysis of Body Fluids in the Hematology Laboratory 31. Primary Hemostasis 32. Secondary Hemostasis and Fibrinolysis 33. Disorders of Primary Hemostasis 34. Disorders of Secondary Hemostasis 35. Thrombophilia 36. Hemostasis: Laboratory Testing and Instrumentation 37. Hematology Procedures 38. Bone Marrow Examination 39. Automation in Hematology 40. Flow Cytometry 41. Chromosome Analysis of Hematopoietic and Lymphoid Disorders 42. Molecular Analysis of Hematologic Diseases 43. Quality Assessment in the Hematology Laboratory Appendices A. Reference Intervals B. Hematopoietic Neoplasms C. WHO 2017 Classifications D. Hematology Procedures E. Chapter Quiz Answer Key F. Checkpoints Answer Key G. Case Study Answer KeyPeople also search: clinical laboratory hematology 4th edition pdf clinical laboratory hematology 4th edition clinical laboratory hematology mckenzie 4th editionDownload sample free sample download If you need more samples or complete documents, please contact online customer service!
-
Test Bank for Concepts in Strategic Management and Business Policy, 12th Edition: Wheelen Instant download Test Bank for Concepts in Strategic Management and Business Policy, 12th Edition: Wheelen pdf docx epub after payment. Product details: This book contains the latest research and examples of well-known and not-so-well known companies dealing with complicated strategic issues. A Strategic Management Model that runs through the first eleven chapters and is made operational through the Strategic Audit, a complete case analysis in terms of external and internal factors and takes the student through the generation of strategic alternatives and implantation programs. Table of contents: People also search: Concepts in Strategic Management and Business Policy Concepts in Strategic Management and Business Policy Wheelen Concepts in Strategic Management and Business Policy Wheelen 12th Concepts in Strategic Management and Business Policy Wheelen 12th Test Bank Test Bank for Concepts in Strategic Management and Business Policy, 12th Edition: Wheelen DownloadDownload sample free sample download If you need more samples or complete documents, please contact online customer service!