Pfleeger et al., 2015
Type | Book |
---|---|
Title | Security in computing - 5th edition |
Authors | Pfleeger, C.P., Pfleeger, S.L., Margulies, J. |
Year | 2015 |
Harvard | Pfleeger, C.P., Pfleeger, S.L., Margulies, J., 2015. Security in computing - 5th edition, Fifth edition. ed. Prentice Hall, Upper Saddle River, NJ. |
ISBN |
|
Links | https://www.amazon.com/Security-Computing-5th-Charles-Pfleeger/dp/0134085043 |
Abstract
Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.
Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.
(https://www.amazon.com/Security-Computing-5th-Charles-Pfleeger/dp/0134085043, accessed 13 nov 2020)
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.