Please use this identifier to cite or link to this item: http://biblioteca.unisced.edu.mz/handle/123456789/3096
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTolboom, Ryan-
dc.date.accessioned2023-09-29T15:34:36Z-
dc.date.available2023-09-29T15:34:36Z-
dc.date.issued2023-06-06-
dc.identifier.citationp118en_US
dc.identifier.urihttp://biblioteca.unisced.edu.mz/handle/123456789/3096-
dc.description.abstractThe text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.en_US
dc.publisherRyan Tolboomen_US
dc.subjectAAAen_US
dc.subjectHackeren_US
dc.subjectCIAen_US
dc.titleComputer Systems Securityen_US
dc.title.alternativePlanning for Successen_US
dc.typeBooken_US
Appears in Collections:Redes

Files in This Item:
File Description SizeFormat 
security.pdf3.69 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.