Handbook of information security / Hossein Bidgoli, editor-in-chief.

Contributor(s): Bidgoli, HosseinMaterial type: TextTextPublisher: Hoboken, N.J. : John Wiley, c2006Description: 3 v. : ill. ; 29 cmISBN: 9780471648307 (v. 1 : cloth : alk. paper); 0471648302 (v. 1 : cloth : alk. paper); 9780471648314 (v. 2 : cloth : alk. paper); 0471648310 (v. 2 : cloth : alk. paper); 9780471648321 (v. 3 : cloth : alk. paper); 0471648329 (v. 3 : cloth : alk. paper); 9780471222019 (set : cloth : alk. paper); 0471222011 (set : cloth : alk. paper); 0471648337 (cloth set : alk. paper); 9780471648338 (cloth set : alk. paper)Subject(s): Computer networks -- Security measures | Home computer networksDDC classification: 005.8 LOC classification: TK5105.59 | .H35 2006Online resources: Table of contents | Publisher description
Contents:
v. 1. Key concepts, infrastructure, standards, and protocols -- v. 2. Information warfare; social, legal, and international issues; and security foundations -- v. 3. Threats, vulnerabilities, prevention, detection, and management.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Call number Copy number Status Notes Date due Barcode
Books Books Female Library
REF TK5105.59 .H35 2006 (Browse shelf (Opens below)) 1 Available STACKS 51952000076148
Books Books Female Library
REF TK5105.59 .H35 2006 (Browse shelf (Opens below)) 2 Available STACKS 51952000076155
Books Books Female Library
REF TK5105.59 .H35 2006 (Browse shelf (Opens below)) 3 Available STACKS 51952000076162
Books Books Main Library
REF TK5105.59 .H35 2006 (Browse shelf (Opens below)) 1 Available STACKS 51952000053989
Books Books Main Library
REF TK5105.59 .H35 2006 (Browse shelf (Opens below)) 2 Available STACKS 51952000053996
Books Books Main Library
REF TK5105.59 .H35 2006 (Browse shelf (Opens below)) 3 Available STACKS 51952000053009

Includes bibliographical references and indexes.

v. 1. Key concepts, infrastructure, standards, and protocols -- v. 2. Information warfare; social, legal, and international issues; and security foundations -- v. 3. Threats, vulnerabilities, prevention, detection, and management.

1 2

There are no comments on this title.

to post a comment.