<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Computer security</title>
    <subTitle>art and science</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Wyatt, Dariel</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
    <role>
      <roleTerm type="text">author.</roleTerm>
    </role>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="marc">bibliography</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">nyu</placeTerm>
    </place>
    <dateIssued encoding="marc">2024</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>viii, 274 pages : illustrations ; 25 cm.</extent>
  </physicalDescription>
  <abstract>"Computer security involves safeguarding computers from theft or damage to their data, hardware, and software. It also encompasses protecting computer systems from disruption or misdirection of services they provide. Threats to computer security are wide-ranging and not limited to phishing, spoofing, denial-of-service attacks, backdoors, and direct-access attacks. With growing reliance on computer technology, the internet, wireless networks, and smart devices, computer security has become increasingly crucial. Countermeasures against cyberattacks include security by design, secure coding, security architecture, and hardware protection mechanisms. The topics covered in this extensive book deal with the core concepts related to computer security. It is upcoming field that has undergone rapid development over the past few decades. This book will serve as a valuable source of reference for graduate and postgraduate students"-- Back cover.</abstract>
  <tableOfContents>Computer security: an introduction -- Access control principles in computer society -- Steps in computer society -- Network and internet security measures -- Understanding malicious software -- Software solutions for computer security.</tableOfContents>
  <note type="statement of responsibility">Dariel Wyatt.</note>
  <note>Includes bibliographical references and index.</note>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer networks</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Data protection</topic>
  </subject>
  <classification authority="lcc">QA76.6.A25 .W938 2024</classification>
  <classification authority="ddc" edition="23">005.8 W97c</classification>
  <relatedItem type="series">
    <titleInfo>
      <title>Knowledge series</title>
    </titleInfo>
  </relatedItem>
  <identifier type="isbn">9781647285845</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg">CSPC</recordContentSource>
    <recordCreationDate encoding="marc">260304</recordCreationDate>
    <recordChangeDate encoding="iso8601">20260305141608.0</recordChangeDate>
    <languageOfCataloging>
      <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
    </languageOfCataloging>
  </recordInfo>
</mods>
