Image from Google Jackets

Information Security: Principles and Practice

By: By: Publication details: New Delhi: Wiley India (P.) Ltd, 2023Description: 530ISBN:
  • 9789354644313
Subject(s): DDC classification:
  • 005.8 STA
Summary: Information Security: Principles and Practice, third edition, is the perfect textbook for undergraduate and graduate students in all Computer Science programs and remains essential reading for professionals working in industrial or government security. Providing up-to-date coverage of the rapidly evolving field of information security, the book focuses on the four critical components of information security—cryptography, access control, security protocols, and software. In addition, it provides a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book Book Alliance College of Engineering and Design Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15726
Book Book Alliance College of Engineering and Design Computer Science and Information Technology 005.8 STA (Browse shelf(Opens below)) Available E15725
Total holds: 0

Information Security: Principles and Practice, third edition, is the perfect textbook for undergraduate and graduate students in all Computer Science programs and remains essential reading for professionals working in industrial or government security. Providing up-to-date coverage of the rapidly evolving field of information security, the book focuses on the four critical components of information security—cryptography, access control, security protocols, and software. In addition, it provides a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data.

There are no comments on this title.

to post a comment.