Normal view MARC view ISBD view

Security in Computing / Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies

By: Pfleeger, Charles P.
Contributor(s): Pfleeger, Shari Lawrence | Margulies, Jonathan.
Material type: TextTextPublisher: Chennai Pearson India Education Services Pvt. Ltd. 2019Edition: 5th Ed.Description: xxxiii, 910p. : ill. ; 24cm.ISBN: 9789352866533.Subject(s): Computer Security; Privacy, Right of; Data Protection; Electronic Data Processing departments-Security MeasuresDDC classification: 005.8 PFL Online resources: Click here to access online
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Notes Date due Barcode Course reserves
 Text Book Text Book VIT-AP
General Stacks
005.8 PFL (Browse shelf) Available CSE 018770

Information and System Security

 Text Book Text Book VIT-AP
General Stacks
005.8 PFL (Browse shelf) Available CSE 018771
 Text Book Text Book School of Computer Science Section
General Stacks
005.8 PFL (Browse shelf) In transit from VIT-AP to School of Computer Science Section since 2024-01-17 CSE 018772
 Text Book Text Book VIT-AP
General Stacks
005.8 PFL (Browse shelf) Available CSE 018773
 Text Book Text Book VIT-AP
General Stacks
005.8 PFL (Browse shelf) Available CSE 018774
Reference Book Reference Book VIT-AP
General Stacks
Reference 005.8 PFL (Browse shelf) Not for loan CSE 013358
Reference Book Reference Book VIT-AP
General Stacks
005.8 PFL (Browse shelf) Not for loan CSE 012746
Reference Book Reference Book VIT-AP
General Stacks
Reference 005.8 PFL (Browse shelf) Not for loan CSE 012636

It includes bibliography and index

This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law and ethics. Reflecting rapidly evolving attacks, countermeasures and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions and more.
Features This classic text has been thoroughly updated to reflect today’s newest technologies, standards and trends
Topics progress from simple and straightforward to complex and intricate
Easy-to-read descriptions of concepts and incidents
As of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor use

There are no comments for this item.

Log in to your account to post a comment.

Visitor Number:

Powered by Koha