Sold Out
Book Categories |
Foreword | ||
Preface to the Third Edition | ||
Ch. 1 | Is There a Security Problem in Computing? | 1 |
Ch. 2 | Elementary Cryptography | 35 |
Ch. 3 | Program Security | 95 |
Ch. 4 | Protection in General-Purpose Operating Systems | 179 |
Ch. 5 | Designing Trusted Operating Systems | 229 |
Ch. 6 | Database Security | 309 |
Ch. 7 | Security in Networks | 363 |
Ch. 8 | Administering Security | 491 |
Ch. 9 | Legal, Privacy, and Ethical Issues in Computer Security | 553 |
Ch. 10 | Cryptography Explained | 629 |
Bibliography | 691 | |
Index | 727 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity in Computing
X
This Item is in Your InventorySecurity in Computing
X
You must be logged in to review the productsX
X
X
Add Security in Computing, , Security in Computing to the inventory that you are selling on WonderClubX
X
Add Security in Computing, , Security in Computing to your collection on WonderClub |