000 02125nam a22003977a 4500
003 IIITD
005 20250723152354.0
008 250709b |||||||| |||| 00| 0 eng d
020 _a9789367135587
040 _aIIITD
082 _a005.8
_bPFL-S
100 _aPfleeger, Charles P.
245 _aSecurity in computing
_cby Charles P. Pfleeger, Shari Lawrence Pfleeger and Lizzie Coles-Kemp
250 _a6th ed.
260 _aNoida :
_bPearson,
_c©2025
300 _axxxiii, 886 p. :
_bill. ;
_c22 cm.
504 _aIncludes bibliographical references and index.
505 _t1. Introduction
505 _t2. Toolbox : authentication, access control, and cryptography
505 _t3. Programs and programming
505 _t4. Operating systems
505 _t5. Data and Databases
505 _t6. Networks
505 _t7. The Internet-user side
505 _t8. Details of cryptography
505 _t9. Privacy and Incidents
505 _t10. Legal issues and ethics
520 _aThis book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles.
650 _aComputer networks -- Security measures
650 _aData protection
650 _aComputer Security
650 _aComputers -- Access control
700 _aPfleeger, Shari Lawrence
700 _aColes-Kemp, Lizzie
942 _cBK
_2ddc
999 _c208659
_d208659