Cargando…

Security in computing /

The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alik...

Descripción completa

Detalles Bibliográficos
Autores principales: Pfleeger, Charles P., 1948- (Autor), Pfleeger, Shari Lawrence (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Pearson, 2002.
Edición:3rd edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1224586536
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 160813s2002 xx eo 000 0 eng d
040 |a TOH  |b eng  |c TOH  |d OCLCF  |d UAB 
020 |a 9780130355485 
020 |a 0130355488 
024 8 |a 0130355488 
035 |a (OCoLC)1224586536 
049 |a UAMI 
100 1 |a Pfleeger, Charles P.,  |d 1948-  |e author. 
245 1 0 |a Security in computing /  |c Pfleeger, Charles. 
250 |a 3rd edition. 
264 1 |a [Place of publication not identified] :  |b Pearson,  |c 2002. 
300 |a 1 online resource (746 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 104.00 
520 |a The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources. 
542 |f © Pearson Technology Group  |g 2003 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title page (viewed December 2, 2002). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Privacy, Right of. 
650 0 |a Data protection. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Privacy, Right of.  |2 fast  |0 (OCoLC)fst01077444 
700 1 |a Pfleeger, Shari Lawrence,  |e author. 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
776 0 8 |i Online version:  |a Pfleeger, Charles P., 1948-  |t Security in computing.  |b 3rd ed.  |d Upper Saddle River, N.J. : Prentice Hall PTR, 2003  |w (OCoLC)606928773 
776 0 8 |i Online version:  |a Pfleeger, Charles P., 1948-  |t Security in computing.  |b 3rd ed.  |d Upper Saddle River, N.J. : Prentice Hall PTR, 2003  |w (OCoLC)607802757 
856 4 0 |u https://learning.oreilly.com/library/view/~/0130355488/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP