Please use this identifier to cite or link to this item:
http://dspace.uniten.edu.my/jspui/handle/123456789/18170
Title: | Security in computing, 3rd ed. | Authors: | Charles P. Pfleeger, Shari Lawrence Pfleeger. | Keywords: | Wireless communications. | Issue Date: | 2003 | Publisher: | Prentice Hall PTR | Abstract: | This book is intended for students of computer security, including college and university students, computing professionals, managers, and users. All of them want to know how to control the risk of computer security. But individuals differ in the kind of information they need. Some want a broad survey, while others want to focus on particular topics, such as networks or program development. This book provides the breadth and depth that most readers want. It is organized by general area of computing, so that readers with particular interests can find information easily. The chapters progress in an orderly manner, from general security concerns to the specific needs of specialized applications, and finally to overarching questions of management and legal issues. Thus, the book covers five key areas: • Introduction : threats, vulnerabilities, and controls • Encryption : the “Swiss army knife” of security controls • Code : security in programs, including applications, operating systems, database management systems, and networks • Management : implementing and maintaining a computing style • Law, privacy, ethics : nontechnical approaches by which society controls computer security risks | URI: | http://dspace.uniten.edu.my/jspui/handle/123456789/18170 |
Appears in Collections: | UNITEN Energy Collection |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Wireless Communications_ Principles and Practice.pdf | 16.94 MB | Adobe PDF | View/Open |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.