Security In Computing
Publication details: Noida: Pearson , 2018Edition: 5Description: 910ISBN:- 9789352866533
- 005.8 PFL
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
ACED | Computer Science and Information Technology | 005.8 PFL (Browse shelf(Opens below)) | Available | E13675 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 PFL (Browse shelf(Opens below)) | Not for loan | E13673 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 PFL (Browse shelf(Opens below)) | Available | E13674 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 PFL (Browse shelf(Opens below)) | Available | E13676 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 PFL (Browse shelf(Opens below)) | Available | E12227 |
Browsing ACED shelves, Collection: Computer Science and Information Technology Close shelf browser (Hides shelf browser)
005.8 PFL Security in computing | 005.8 PFL Security in Computing | 005.8 PFL Security In Computing | 005.8 PFL Security In Computing | 005.8 PFL Security In Computing | 005.8 PFL Security In Computing | 005.8 PFL Security In Computing |
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more. Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trends Topics progress from simple and straightforward to complex and intricate Easy-to-read descriptions of concepts and incidents As of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor
There are no comments on this title.