Computer security : principles and practice / Daniel Wyatt.
Material type:
TextPublisher: Forest Hills, NY : Willford Press, 2019Description: vi, 271 pages : illustrations ; 26 cmContent type: - text
- unmediated
- volume
- 9781682857458
- 005.8 W97c 23
- QA76.9.A25
Contents:
Introduction to computer security -- Computer security: access control principles -- Fundamental steps in computer security -- Network and internet security -- Malicious software: computer threats -- Computer security software.
| Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main Library | Circulation Section | CIR 005.8 W97c 2019 (Browse shelf(Opens below)) | 1-4 | Available | 028065 | ||
Books
|
Main Library | Circulation Section | CIR 005.8 W97c 2019 (Browse shelf(Opens below)) | 2-4 | Available | 028635 | ||
Books
|
Main Library | Circulation Section | CIR 005.8 W97c 2019 (Browse shelf(Opens below)) | 3-4 | Available | 028636 | ||
Books
|
Main Library | Circulation Section | CIR 005.8 W97c 2019 (Browse shelf(Opens below)) | 4-4 | Available | 028637 |
Browsing Main Library shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| CIR 005.8 W735b 2013 The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice/ | CIR 005.8 W743 2023 Wireless communication security / | CIR 005.8 W97c 2019 Computer security : principles and practice / | CIR 005.8 W97c 2019 Computer security : principles and practice / | CIR 005.8 W97c 2019 Computer security : principles and practice / | CIR 005.8 W97c 2019 Computer security : principles and practice / | CIR 005.8 W97c 2024 Computer security : art and science / |
Includes bibliographical references and index.
Introduction to computer security -- Computer security: access control principles -- Fundamental steps in computer security -- Network and internet security -- Malicious software: computer threats -- Computer security software.
There are no comments on this title.
Log in to your account to post a comment.