Security in computing
Material type: TextPublication details: Noida Pearson 2018Edition: 5Description: 910pISBN: 9789352866533Subject(s): Computer security | Data protection | Electronic data processing departments--Security measuresDDC classification: 005.8 Summary: This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more.Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trendsTopics progress from simple and straightforward to complex and intricateEasy-to-read descriptions of concepts and incidentsAs of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor useTable of Contents Foreword Preface Acknowledgments About the Authors Chapter 1: Introduction Chapter 2: Toolbox: Authentication, Access Control and Cryptography Chapter 3: Programs and Programming Chapter 4: the Web—User Side Chapter 5: Operating Systems Chapter 6: Networks Chapter 7: Databases Chapter 8: Cloud Computing Chapter 9: Privacy Chapter 10: Management and Incidents Chapter 11: Legal Issues and Ethics Chapter 12: Details of Cryptography Chapter 13: Emerging Topics Bibliography Index.Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
BK | Stack | Stack | 005.8 PFL/S (Browse shelf (Opens below)) | Available | 59892 |
Browsing Kannur University Central Library shelves, Shelving location: Stack, Collection: Stack Close shelf browser (Hides shelf browser)
005.8 NEL/G Guide to computer forensics and investigations | 005.8 OTT/S Securing the virtual environment: How to defend the enterprise against attack | 005.8 PFL/A Analyzing computer security : a threat/vulnerability/countermeasure approach | 005.8 PFL/S Security in computing | 005.8 PFL/S Security in computing | 005.8 SIN/C Cybersecurity and cyberwar : what everyone needs to know | 005.8 STA/C Cryptography and network security |
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more.Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trendsTopics progress from simple and straightforward to complex and intricateEasy-to-read descriptions of concepts and incidentsAs of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor useTable of Contents Foreword Preface Acknowledgments About the Authors Chapter 1: Introduction Chapter 2: Toolbox: Authentication, Access Control and Cryptography Chapter 3: Programs and Programming Chapter 4: the Web—User Side Chapter 5: Operating Systems Chapter 6: Networks Chapter 7: Databases Chapter 8: Cloud Computing Chapter 9: Privacy Chapter 10: Management and Incidents Chapter 11: Legal Issues and Ethics Chapter 12: Details of Cryptography Chapter 13: Emerging Topics Bibliography Index.
There are no comments on this title.