Sold Out
Book Categories |
Foreword | ||
Preface to the Third Edition | ||
Ch. 1 | Is There a Security Problem in Computing? | 1 |
Ch. 2 | Elementary Cryptography | 35 |
Ch. 3 | Program Security | 95 |
Ch. 4 | Protection in General-Purpose Operating Systems | 179 |
Ch. 5 | Designing Trusted Operating Systems | 229 |
Ch. 6 | Database Security | 309 |
Ch. 7 | Security in Networks | 363 |
Ch. 8 | Administering Security | 491 |
Ch. 9 | Legal, Privacy, and Ethical Issues in Computer Security | 553 |
Ch. 10 | Cryptography Explained | 629 |
Bibliography | 691 | |
Index | 727 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity in Computing
X
This Item is in Your InventorySecurity in Computing
X
You must be logged in to review the productsX
X
X
Add Security in Computing, The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and students have turned to Security in Computi, Security in Computing to the inventory that you are selling on WonderClubX
X
Add Security in Computing, The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and students have turned to Security in Computi, Security in Computing to your collection on WonderClub |