Wonder Club world wonders pyramid logo
×

Computer network security and cyber ethics Book

Computer network security and cyber ethics
Computer network security and cyber ethics, , Computer network security and cyber ethics has a rating of 3 stars
   2 Ratings
X
Computer network security and cyber ethics, , Computer network security and cyber ethics
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Computer network security and cyber ethics
  • Written by author Joseph Migga Kizza
  • Published by Jefferson, N.C. ; McFarland, c2002., 2002/01/31
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Computer crimes and the invasion of privacy by electronic means are major concerns for many people. They threaten the future of access to information by allied uses of electronic communication media. Chapter One provides information on the underlying infrastructure and communication protocols to help in understanding computer crimes and the dangers associated with them. Chapter Two categorizes cyber attacks by various motives--personal, pleasure-seeking, attention-seeking, revenge or even vendetta, financial escapades and raw hate. Likely targets and security issues in the day-to-day computer augmented settings are discussed in Chapter Three. Chapter Four addresses the costs of computer crimes to individuals, to the nation and to businesses and their clients. Crime prevention is the topic of Chapter Five, which describes the efforts being made by individuals, civic groups, institutions, nations and multinational bodies to eliminate computer crime. Chapter Six assesses the future of cyber attacks by looking at the changing technology, the availability of computer access to the wrong people, and education and crime prevention measures. The mind of the computer hacker is explored at length.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Computer network security and cyber ethics, , Computer network security and cyber ethics

X
WonderClub Home

This item is in your Collection

Computer network security and cyber ethics, , Computer network security and cyber ethics

Computer network security and cyber ethics

X
WonderClub Home

This Item is in Your Inventory

Computer network security and cyber ethics, , Computer network security and cyber ethics

Computer network security and cyber ethics

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: