Security in computing

By: Pfleeger, Charles PContributor(s): Pfleeger, Shari Lawrence | Margulies, JonathanMaterial type: TextTextPublication details: Noida Pearson 2018Edition: 5Description: 910pISBN: 9789352866533Subject(s): Computer security | Data protection | Electronic data processing departments--Security measuresDDC classification: 005.8 Summary: This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more.Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trendsTopics progress from simple and straightforward to complex and intricateEasy-to-read descriptions of concepts and incidentsAs of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor useTable of Contents Foreword Preface Acknowledgments About the Authors Chapter 1: Introduction Chapter 2: Toolbox: Authentication, Access Control and Cryptography Chapter 3: Programs and Programming Chapter 4: the Web—User Side Chapter 5: Operating Systems Chapter 6: Networks Chapter 7: Databases Chapter 8: Cloud Computing Chapter 9: Privacy Chapter 10: Management and Incidents Chapter 11: Legal Issues and Ethics Chapter 12: Details of Cryptography Chapter 13: Emerging Topics Bibliography Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Status Date due Barcode
BK BK
Stack
Stack 005.8 PFL/S (Browse shelf (Opens below)) Available 59892

This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more.Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trendsTopics progress from simple and straightforward to complex and intricateEasy-to-read descriptions of concepts and incidentsAs of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor useTable of Contents Foreword Preface Acknowledgments About the Authors Chapter 1: Introduction Chapter 2: Toolbox: Authentication, Access Control and Cryptography Chapter 3: Programs and Programming Chapter 4: the Web—User Side Chapter 5: Operating Systems Chapter 6: Networks Chapter 7: Databases Chapter 8: Cloud Computing Chapter 9: Privacy Chapter 10: Management and Incidents Chapter 11: Legal Issues and Ethics Chapter 12: Details of Cryptography Chapter 13: Emerging Topics Bibliography Index.

There are no comments on this title.

to post a comment.

Powered by Koha