Additional information
| Full Title | Computer Security |
|---|---|
| Author(s) | |
| Edition | |
| ISBN | 9781423223573, 9781423223566 |
| Publisher | QuickStudy Reference Guides |
| Format | PDF and EPUB |
Original price was: $6.95.$1.39Current price is: $1.39.
Access Computer Security Now. Discount up to 90%
| Full Title | Computer Security |
|---|---|
| Author(s) | |
| Edition | |
| ISBN | 9781423223573, 9781423223566 |
| Publisher | QuickStudy Reference Guides |
| Format | PDF and EPUB |
Keep personal information safe from people who have malicious intent to steal, change or destroy it, prevent large-scale attacks on businesses and keep your computer running smoothly with the help of this handy guide that explains how “hackers” will attack and what you can do to protect yourself and your business. Topics covered include: Terminology Threats Malware Social Engineering Prevention & Protection Security Plan Security Practices & Education Software & Driver Updates Anti Virus Network Security Public Security
Original price was: $72.95.$24.99Current price is: $24.99.
Access Computer Security Now. Discount up to 90%
| Full Title | Computer Security |
|---|---|
| Author(s) | David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick |
| Edition | |
| ISBN | 9781483218373, 9780123576507 |
| Publisher | Academic Press |
| Format | PDF and EPUB |
Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.