Computer security [Book] : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer [and] Michael Howard.
Material type: TextPublication details: New Delhi : Dorling Kindersley (India) Pvt. Ltd., licensees of Pearson Education in South Asia., 2010.Description: xviii, 798 p. : ill. ; 25 cmISBN:- 9788131733516
- 005.8 22
- 005.8
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Junaid Zaidi Library, COMSATS University Islamabad Ground Floor | 005.8 STA-C (Browse shelf(Opens below)) | Available | 48534 | ||
Books | Junaid Zaidi Library, COMSATS University Islamabad Ground Floor | 005.8 STA-C (Browse shelf(Opens below)) | Available | 50734 |
Browsing Junaid Zaidi Library, COMSATS University Islamabad shelves, Shelving location: Ground Floor Close shelf browser (Hides shelf browser)
005.8 SOL-S Security in a Web 2.0+ world a standards based approach / | 005.8 STA-C Tough times never last, but tough people do! | 005.8 STA-C Cryptography and network security : principles and practice / | 005.8 STA-C Computer security principles and practice / | 005.8 STA-C Computer security principles and practice / | 005.8 STA-C Computer security principles and practice / | 005.8 STA-C Cryptography and network security principles and practice / |
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study. .
There are no comments on this title.