Amazon cover image
Image from Amazon.com

Security in computing

By: Contributor(s): Material type: TextTextPublication details: Noida : Pearson, ©2025Edition: 6th edDescription: xxxiii, 886 p. : ill. ; 22 cmISBN:
  • 9789367135587
Subject(s): DDC classification:
  • 005.8 PFL-S
Contents:
1. Introduction
2. Toolbox : authentication, access control, and cryptography
3. Programs and programming
4. Operating systems
5. Data and Databases
6. Networks
7. The Internet-user side
8. Details of cryptography
9. Privacy and Incidents
10. Legal issues and ethics
Summary: This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Books Books IIITD General Stacks Computer Science and Engineering 005.8 PFL-S (Browse shelf(Opens below)) Available 013522
Total holds: 0

Includes bibliographical references and index.

1. Introduction

2. Toolbox : authentication, access control, and cryptography

3. Programs and programming

4. Operating systems

5. Data and Databases

6. Networks

7. The Internet-user side

8. Details of cryptography

9. Privacy and Incidents

10. Legal issues and ethics

This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in