Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/18170
Title: Security in computing, 3rd ed.
Authors: Charles P. Pfleeger, Shari Lawrence Pfleeger. 
Keywords: Wireless communications.
Issue Date: 2003
Publisher: Prentice Hall PTR
Abstract: This book is intended for students of computer security, including college and university students, computing professionals, managers, and users. All of them want to know how to control the risk of computer security. But individuals differ in the kind of information they need. Some want a broad survey, while others want to focus on particular topics, such as networks or program development. This book provides the breadth and depth that most readers want. It is organized by general area of computing, so that readers with particular interests can find information easily. The chapters progress in an orderly manner, from general security concerns to the specific needs of specialized applications, and finally to overarching questions of management and legal issues. Thus, the book covers five key areas: • Introduction : threats, vulnerabilities, and controls • Encryption : the “Swiss army knife” of security controls • Code : security in programs, including applications, operating systems, database management systems, and networks • Management : implementing and maintaining a computing style • Law, privacy, ethics : nontechnical approaches by which society controls computer security risks
URI: http://dspace.uniten.edu.my/jspui/handle/123456789/18170
Appears in Collections:UNITEN Energy Collection

Files in This Item:
File Description SizeFormat 
Wireless Communications_ Principles and Practice.pdf16.94 MBAdobe PDFView/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.