Security in computing / Charles P. Pfleeger
Publisher: Upper Saddle River, N.J. : Prentice Hall, cop. 1997Edition: 2nd edDescription: xviii,574 p illISBN: 0-13-185794-0 (International ed.); 0-13-337486-6Subject(s): Computer security | Computer security | Computer security | Cryptography | Data protection | Data protection | Dataintegritet | datas�kerhet | Datas�kerhet | Datas�kerhet | Dataskydd | IT-s�kerhet | Kryptering | Privacy, Right ofGenre/Form: BokDDC classification: 005.8 | 005.8 | 005.8 | 005.8 | a005.8| Item type | Current location | Home library | Collection | Call number | URL | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | NFIC | 005.8 PFL (Browse shelf) | Link to resource | Available | MCS24975 |
Browsing Military College of Signals (MCS) shelves Close shelf browser
| 005.8 PFL Security in computing / | 005.8 PFL Security in computing / | 005.8 PFL Security in computing / | 005.8 PFL Security in computing / | 005.8 PHI Hacking exposed computer forensics (EBOOK) | 005.8 PIS Java 2 network security /(E-BOOK) | 005.8.PIS Java 2 network security -(E-BOOK) |
Is There a Security Problem in Computing (Page-1) Basic Encryption and Decryption (Page-21) Security Encryption Systems (Page-69) Using Encryption Protocols and Practices (Page-126) Production and General Purpose Operating Systems (Page-228) Designing Trusted Operating Systems (Page-269) Data Base Security (Page-336) Security in Networks and Distributed Systems (Page-377) Administering Security (Page-447) Legal and Ethical Issues in Computer Security (Page-492)
Almirah No.8 Shelf No.5

Book
There are no comments on this title.