Computer security literacy staying safe in a digital world
Preface Approach Traditional computer security books educate readers about a multitude of topics, ranging from secure programming practices, protocols, and algorithm designs to cryptography and ethics. These books typically focus on the implementation or theory of security controls and mechanisms at...
Saved in:
| Main Author: | Jacobson, Douglas |
|---|---|
| Other Authors: | Idziorek, Joseph |
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press / Taylor & Francis Group
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Practical computer literacy
by: Pardons, June Jamrich, et al.
Published: (2005)
by: Pardons, June Jamrich, et al.
Published: (2005)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Computer security art and science
by: Bishop, Matt
Published: (2019)
by: Bishop, Matt
Published: (2019)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2015)
by: Stallings, William, et al.
Published: (2015)
Computer security art and science
by: Bishop lhMatt
by: Bishop lhMatt
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Practical computer literacy internet and computing core certification
by: Parsons, June Jamrich
Published: (2010)
by: Parsons, June Jamrich
Published: (2010)
Computer security basics
by: Lehtinen, Rick
Published: (2006)
by: Lehtinen, Rick
Published: (2006)
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Fundamentals of computer security technology
by: Amoroso
Published: (1994)
by: Amoroso
Published: (1994)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Securing client/server computer networks
by: Davis
Published: (1996)
by: Davis
Published: (1996)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Computer literacy basics a comprehensive guide to IC3
by: Morrison, Connie
Published: (2013)
by: Morrison, Connie
Published: (2013)
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997)
by: Bruce
Published: (1997)
Security awareness applying practical security in your world
by: Ciampa
Published: (2004)
by: Ciampa
Published: (2004)
Multimedia literacy
by: Hofstetter
Published: (1995)
by: Hofstetter
Published: (1995)
Multimedia literacy
by: Hofstetter
Published: (1997)
by: Hofstetter
Published: (1997)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Information security culture a human firewall approach
by: Omar Zakaria
Published: (2013)
by: Omar Zakaria
Published: (2013)
Security for the digital world within an ethical framework
Published: (2016)
Published: (2016)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Windows security monitoring scenarios and patterns
by: Miroshnikov, Andreĭ
Published: (2018)
by: Miroshnikov, Andreĭ
Published: (2018)
Secrets and lies digital security in a networked world
by: Schneier, Bruce 1963-
Published: (2000)
by: Schneier, Bruce 1963-
Published: (2000)
Data-Driven Security Analysis, Visualization and Dashboards
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
Designing security architecture solutions
by: Ramachandran, Jay
Published: (2002)
by: Ramachandran, Jay
Published: (2002)
Computer security
by: Gollman
Published: (2006)
by: Gollman
Published: (2006)
Wireshark for security professionals using Wireshark and the Metasploit Framework
by: Bullock, Jessey, et al.
Published: (2017)
by: Bullock, Jessey, et al.
Published: (2017)
Information security architecture an integrated approach to security in the organization
by: Tudor, Jan Killmeyer
Published: (2006)
by: Tudor, Jan Killmeyer
Published: (2006)
Securing PHP Apps
by: Edmunds, Ben
Published: (2016)
by: Edmunds, Ben
Published: (2016)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2019)
by: Nelson, Bill, et al.
Published: (2019)
Similar Items
-
Practical computer literacy
by: Pardons, June Jamrich, et al.
Published: (2005) -
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018) -
Computer security art and science
by: Bishop, Matt
Published: (2019) -
Computer security principles and practice
by: Stallings, William, et al.
Published: (2015) -
Computer security art and science
by: Bishop lhMatt


