Computer Systems Security Planning for Success Ryan Tolboom
Material type:
- text
- computer
- online resource
- QA76
- QA76
Legal -- Acknowledgements -- Instructional Notes -- 1. Introduction -- 2. Cryptography -- 3. Malware -- 4. Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. Vulnerability Management and Compliance -- 9. Incident Response and Continuity -- 10. Virtualization
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
Attribution-NonCommercial-ShareAlike
In English.
Description based on print resource
There are no comments on this title.