Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Material type:
TextPublisher: Upper Saddle River, NJ : Prentice Hall, c2007Edition: 4th edDescription: xxix, 845 p. : ill. ; 25 cmISBN: 0132390779 (hardback : alk. paper); 9780132390774 (hardback : alk. paper)Subject(s): Computer security | Data protection | Privacy, Right ofDDC classification: 005.8 LOC classification: QA76.9.A25 | P45 2007Online resources: Table of contents | Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
|---|---|---|---|---|---|---|---|
Books
|
Female Library | QA76.9 .A25 P45 2007 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000082279 | |
Books
|
Main Library | QA76.9 .A25 P45 2007 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000061205 |
Browsing Main Library shelves Close shelf browser
|
|
|
|
|
|
|
||
| QA76.9 .A25 I54 2008 Information security management handbook / | QA76.9 .A25 K39 2002 Network security : private communication in a public world / | QA76.9 .A25 M485 2006 Information security : principles and practices / | QA76.9 .A25 P45 2007 Security in computing / | QA76.9 .A25 S3 2008 Hacking exposed Windows : Windows security secrets & solutions / | QA76.9 .A25 S466 2005 Enterprise security architecture : a business-driven approach / | QA76.9 .A25 V359 2007 Testing code security / |
Includes bibliographical references (p. 782-814) and index.
Is there a security problem in computing? -- Elementary cryptography -- Program security -- Protection in general-purpose operating systems -- Designing trusted operating systems -- Database and data mining security -- Security in networks -- Administering security -- The economics of cybersecurity -- Privacy in computing -- Legal and ethical issues in computer security -- Cryptography explained.
1 2

Books
There are no comments on this title.