|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1224586536 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
160813s2002 xx eo 000 0 eng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCF
|d UAB
|
020 |
|
|
|a 9780130355485
|
020 |
|
|
|a 0130355488
|
024 |
8 |
|
|a 0130355488
|
035 |
|
|
|a (OCoLC)1224586536
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Pfleeger, Charles P.,
|d 1948-
|e author.
|
245 |
1 |
0 |
|a Security in computing /
|c Pfleeger, Charles.
|
250 |
|
|
|a 3rd edition.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Pearson,
|c 2002.
|
300 |
|
|
|a 1 online resource (746 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 104.00
|
520 |
|
|
|a The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
|
542 |
|
|
|f © Pearson Technology Group
|g 2003
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed December 2, 2002).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Privacy, Right of.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Privacy, Right of.
|2 fast
|0 (OCoLC)fst01077444
|
700 |
1 |
|
|a Pfleeger, Shari Lawrence,
|e author.
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
0 |
8 |
|i Online version:
|a Pfleeger, Charles P., 1948-
|t Security in computing.
|b 3rd ed.
|d Upper Saddle River, N.J. : Prentice Hall PTR, 2003
|w (OCoLC)606928773
|
776 |
0 |
8 |
|i Online version:
|a Pfleeger, Charles P., 1948-
|t Security in computing.
|b 3rd ed.
|d Upper Saddle River, N.J. : Prentice Hall PTR, 2003
|w (OCoLC)607802757
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0130355488/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|