Image from Google Jackets

Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger.

By: Contributor(s): Material type: TextTextPublication details: Upper Saddle River, N.J. : Prentice Hall PTR, 2003.Edition: 3rd edDescription: xxix, 746 pages : illustrations ; 24 cmISBN:
  • 9788120327542
  • 8120327543
Subject(s): DDC classification:
  • 005.8
Summary: Security in Computing, Third Edition is a sweeping revision of the field's classic guide to computer security. Thoroughly updated to reflect the latest Internet-based threats, it shows how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. It offers exceptionally clear and accessible coverage of cryptography and other technical issues; security administration; law, privacy, and ethics. New coverage includes wireless security, intrusion detection, quantum cryptography, biometrics, DRM, AES, honeypots, online privacy, and much more.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Botho University Botswana Open Shelves Information Technology 005.8PFL (Browse shelf(Opens below)) Available BC-LIB00175
Books Books Botho University Botswana Open Shelves Information Technology 005.8PFL (Browse shelf(Opens below)) Available BC-LIB00176
Books Books Botho University Botswana Open Shelves Information Technology 005.8PFL (Browse shelf(Opens below)) Available BC-LIB00174
Books Books Botho University eSwatini Open Shelves Information Technology 005.8 PFL (Browse shelf(Opens below)) Available BU-LIB15036
Books Books Botho University eSwatini Open Shelves Information Technology 005.8 PFL (Browse shelf(Opens below)) Available BU-LIB15038
Books Books Botho University eSwatini Open Shelves Information Technology 005.8 PFL (Browse shelf(Opens below)) Available BU-LIB15039

Security in Computing, Third Edition is a sweeping revision of the field's classic guide to computer security. Thoroughly updated to reflect the latest Internet-based threats, it shows how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. It offers exceptionally clear and accessible coverage of cryptography and other technical issues; security administration; law, privacy, and ethics. New coverage includes wireless security, intrusion detection, quantum cryptography, biometrics, DRM, AES, honeypots, online privacy, and much more.

There are no comments on this title.

to post a comment.

Powered by Koha