Please use this identifier to cite or link to this item:
http://biblioteca.unisced.edu.mz/handle/123456789/3096
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tolboom, Ryan | - |
dc.date.accessioned | 2023-09-29T15:34:36Z | - |
dc.date.available | 2023-09-29T15:34:36Z | - |
dc.date.issued | 2023-06-06 | - |
dc.identifier.citation | p118 | en_US |
dc.identifier.uri | http://biblioteca.unisced.edu.mz/handle/123456789/3096 | - |
dc.description.abstract | The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures. | en_US |
dc.publisher | Ryan Tolboom | en_US |
dc.subject | AAA | en_US |
dc.subject | Hacker | en_US |
dc.subject | CIA | en_US |
dc.title | Computer Systems Security | en_US |
dc.title.alternative | Planning for Success | en_US |
dc.type | Book | en_US |
Appears in Collections: | Redes |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
security.pdf | 3.69 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.