Welcome to UE Central Library

Keep Smiling
Normal view MARC view ISBD view

Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

By: Stallings, William.
Contributor(s): Brown, Lawrie.
Material type: materialTypeLabelBookSeries: The William Stallings books on computer and data communications technology.Publisher: Boston : Pearson Education, 2015Edition: 3rd ed.Description: 840 p. : illustrations ; 24 cm.ISBN: 9780133773927; 0133773922; 9781292066172 (pbk).Subject(s): Computer security | Computer networks -- Security measuresDDC classification: 005.8
Contents:
overview 31; Cryptographic tools; user authentication; access control; database and cloud security; malicious software; denial of service attacks; intrusion detection; firewalls and intrusion prevention systems; buffer overflow; software security; operating system security; trusted computing and multilevel security; IT security management and risk assessment; IT security controls, plans, and procedures; physical and infrastructure security; human resources security; security auditing; legal and ethical aspects; symmetric encryption and message confidentiality; public key cryptography and message authentication; internet security protocols and standards; internet authentication applications; wireless network security
List(s) this item appears in: Computer books | New Arrival
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
Books Books UE-Central Library
005.8 St18 (Browse shelf) Available T12982

overview 31;
Cryptographic tools;
user authentication;
access control;
database and cloud security;
malicious software;
denial of service attacks;
intrusion detection;
firewalls and intrusion prevention systems;
buffer overflow;
software security;
operating system security;
trusted computing and multilevel security;
IT security management and risk assessment;
IT security controls, plans, and procedures;
physical and infrastructure security;
human resources security;
security auditing;
legal and ethical aspects;
symmetric encryption and message confidentiality;
public key cryptography and message authentication;
internet security protocols and standards;
internet authentication applications;
wireless network security

There are no comments for this item.

Log in to your account to post a comment.
Copyright © 2019, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk