Security in Computing / Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies
Material type:
- 9789352866533
- 23rd 005.8 PFL
Item type | Current library | Collection | Call number | Status | Notes | Date due | Barcode | Course reserves | |
---|---|---|---|---|---|---|---|---|---|
Text Book | VIT-AP General Stacks | 005.8 PFL (Browse shelf(Opens below)) | Available | CSE | 018770 | ||||
Text Book | VIT-AP General Stacks | 005.8 PFL (Browse shelf(Opens below)) | Available | CSE | 018771 | ||||
Text Book | School of Computer Science Section General Stacks | 005.8 PFL (Browse shelf(Opens below)) | In transit from VIT-AP to School of Computer Science Section since 2024-01-17 | CSE | 018772 | ||||
Text Book | VIT-AP General Stacks | 005.8 PFL (Browse shelf(Opens below)) | Available | CSE | 018773 | ||||
Text Book | VIT-AP General Stacks | 005.8 PFL (Browse shelf(Opens below)) | Available | CSE | 018774 | ||||
Reference Book | VIT-AP General Stacks | Reference | 005.8 PFL (Browse shelf(Opens below)) | Not for loan | CSE | 013358 | |||
Reference Book | VIT-AP General Stacks | 005.8 PFL (Browse shelf(Opens below)) | Not for loan | CSE | 012746 | ||||
Reference Book | VIT-AP General Stacks | Reference | 005.8 PFL (Browse shelf(Opens below)) | Not for loan | CSE | 012636 |
Browsing School of Computer Science Section shelves, Shelving location: General Stacks, Collection: Reference Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 MAI Fundamentals of Network Security | 005.8 MAI Fundamentals of Network Security | 005.8 NEL Guide to Computer Forensics and Investigations / | 005.8 PFL Security in Computing / | 005.8 PFL Security in Computing / | 005.8 RAN Core Software Security : | 005.8 RAN Linux Hardening in Hostile Networks : |
It includes bibliography and index
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more.
Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trends
Topics progress from simple and straightforward to complex and intricate
Easy-to-read descriptions of concepts and incidents
As of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor use
There are no comments on this title.