Library Catalogue

Image from Google Jackets

Computer Systems Security Planning for Success Ryan Tolboom

By: Contributor(s): Material type: TextTextSeries: Open textbook libraryDistributor: Minneapolis, MN Open Textbook LibraryPublisher: Newark, NJ Ryan TolboomDescription: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
Subject(s): LOC classification:
  • QA76
  • QA76
Online resources:
Contents:
Legal -- Acknowledgements -- Instructional Notes -- 1. Introduction -- 2. Cryptography -- 3. Malware -- 4. Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. Vulnerability Management and Compliance -- 9. Incident Response and Continuity -- 10. Virtualization
Subject: The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Legal -- Acknowledgements -- Instructional Notes -- 1. Introduction -- 2. Cryptography -- 3. Malware -- 4. Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. Vulnerability Management and Compliance -- 9. Incident Response and Continuity -- 10. Virtualization

The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.

Attribution-NonCommercial-ShareAlike

In English.

Description based on print resource

There are no comments on this title.

to post a comment.

© 2024, Kenya Medical Training College | All Rights Reserved