Computer security : protecting digital resources / Robert C. Newman.
Material type:
TextPublication details: Sudbury, Mass. : Jones and Bartlett Publishers, c2010.Description: xxviii, 453 p. : ill. ; 24 cmISBN: - 9780763759940 (pbk.)
- 005.8 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / NE.C 2010 (Browse shelf(Opens below)) | 1 | Available | 006594 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / MC.S 2006 Software security : | 005.8 / MC.S 2006 Software security : | 005.8 / MO.C 2007 Cryptography and security services : | 005.8 / NE.C 2010 Computer security : | 005.8 / NO.N 2002 Network intrusion detection / | 005.8 / OB.S 2007 Security of e-systems and computer networks / | 005.8 / OR.B 2009 Beautiful security / |
Includes bibliographical references (p. 443-445) and index.
Cyber Environment and Security Issues -- Attacks, Threats, and Vulnerabilities -- Scams, Identity Theft, and Fraud -- Computer and Digital Assets Security -- The Internet and Web Network Environment -- Wired and Wireless Local Area Networks -- Computer, Server, and Database Security Issues -- E-Commerce Security Mechanisms -- Business Continuity and Disaster Recovery Planning -- Intrusion Detection and Prevention -- Problem Solving and Security Administration -- Security Solutions for Digital Resources -- Standards, Specifications, and Protocols -- Training, Certifications, and Careers.
Today, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten our safety and our peace of mind. Computer Security: Protecting Digital Resources provides a broad approach to computer-related crime, electronic commerce, corporate networking, and Internet security, topics that have become increasingly important as more and more threats are made on our internet environment. This book is oriented toward the average computer user, business professional, government worker, and those within the education community, with the expectation that readers can learn to use the network with some degree of safety and security. The author places emphasis on the numerous vulnerabilities and threats that are inherent in the Internet environment. Efforts are made to present techniques and suggestions to avoid identity theft and fraud.
1
There are no comments on this title.