Normal view MARC view ISBD view

Computer security handbook : Vol. 2

Title By: Bosworth, Seymour [Edited by] | Kabay, Michel E [Edited by] | Whyne, Eric [Edited by]
Material type: BookPublisher: Hoboken, N.J. : John Wiley & Sons, Inc., c2014.Edition: 6th ed.Description: xv, [various pagings] : ill. ; 26 cm.ISBN: 9781118134115Program: CSCI358Subject(s): Electronic data processing departments -- Security measures | BUSINESS & ECONOMICS -- Industrial Management | BUSINESS & ECONOMICS -- Management | BUSINESS & ECONOMICS -- Management Science | BUSINESS & ECONOMICS -- Organizational Behavior | Computer security | Data protection | Information technology -- Security measuresDDC classification: 658.4/78
Summary:
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly–regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
658.478 CO MP (Browse shelf) Available T0054034
REGULAR University of Wollongong in Dubai
Main Collection
658.478 CO MP (Browse shelf) Available T0054035
Total holds: 0

Includes bibliographical references and index.

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly–regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.

CSCI358

Powered by Koha