Image from Google Jackets

Security In Computing

By: By: Publication details: Noida: Pearson , 2018Edition: 5Description: 910ISBN:
  • 9789352866533
Subject(s): DDC classification:
  • 005.8 PFL
Summary: This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more. Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trends Topics progress from simple and straightforward to complex and intricate Easy-to-read descriptions of concepts and incidents As of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor
List(s) this item appears in: New Arrivals for the Month of September - 2023 | New Arrivals for the Month of December - 2023
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book Book ACED Computer Science and Information Technology 005.8 PFL (Browse shelf(Opens below)) Available E13675
Reference Book Reference Book ACED Computer Science and Information Technology 005.8 PFL (Browse shelf(Opens below)) Not for loan E13673
Book Book ACED Computer Science and Information Technology 005.8 PFL (Browse shelf(Opens below)) Available E13674
Book Book ACED Computer Science and Information Technology 005.8 PFL (Browse shelf(Opens below)) Available E13676
Book Book ACED Computer Science and Information Technology 005.8 PFL (Browse shelf(Opens below)) Available E12227
Total holds: 0

This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more. Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trends Topics progress from simple and straightforward to complex and intricate Easy-to-read descriptions of concepts and incidents As of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor

There are no comments on this title.

to post a comment.