Security in computing
Pfleeger, Charles P.
Security in computing by Charles P. Pfleeger, Shari Lawrence Pfleeger and Lizzie Coles-Kemp - 6th ed. - Noida : Pearson, ©2025 - xxxiii, 886 p. : ill. ; 22 cm.
Includes bibliographical references and index.
1. Introduction 2. Toolbox : authentication, access control, and cryptography 3. Programs and programming 4. Operating systems 5. Data and Databases 6. Networks 7. The Internet-user side 8. Details of cryptography 9. Privacy and Incidents 10. Legal issues and ethics
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles.
9789367135587
Computer networks -- Security measures
Data protection
Computer Security
Computers -- Access control
005.8 / PFL-S
Security in computing by Charles P. Pfleeger, Shari Lawrence Pfleeger and Lizzie Coles-Kemp - 6th ed. - Noida : Pearson, ©2025 - xxxiii, 886 p. : ill. ; 22 cm.
Includes bibliographical references and index.
1. Introduction 2. Toolbox : authentication, access control, and cryptography 3. Programs and programming 4. Operating systems 5. Data and Databases 6. Networks 7. The Internet-user side 8. Details of cryptography 9. Privacy and Incidents 10. Legal issues and ethics
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles.
9789367135587
Computer networks -- Security measures
Data protection
Computer Security
Computers -- Access control
005.8 / PFL-S
