Corporate computer security / Randall J. Boyle (Longwood University), Raymond R. Panko (University of Hawaiʻi at Mānoa).

By: Panko, Raymond R [author.]Contributor(s): Boyle, Randall [author.]Material type: TextTextPublisher: Boston : Pearson, [2015]Edition: Fourth editionDescription: xxv, 646 pages : illustrations ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781292060453 (hbk.); 0133545199 (hbk.)Uniform titles: Corporate computer and network security Subject(s): Business enterprises -- Computer networks -- Security measures | Computer security | Computer networks -- Security measures | Computer crimes -- PreventionDDC classification: 005.8, PAN LOC classification: QA76.9.A25 | P36 2015
Contents:
Chapter 1 The Threat Environment (Page-1),Chapter 2 Planning and Policy (Page-59), Chapter 3 Cryptography (Page-127), Chapter 4 Secure Networks (Page-191),Chapter 5 Access Control (Page-245),Chapter 6 Firewalls (Page-313), Chapter 7 Host Hardening (Page-375),Chapter 8 Application Security (Page-433),Chapter 9 Data Protection (Page-485),Chapter 10 Incident and Disaster Response (Page-541).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
Reference 005.8,PAN (Browse shelf) Available Almirah Fresh No.43, Shelf No.5 MCS38673
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,PAN (Browse shelf) Checked out to NS Shafaq Riaz (61101-6967211-0) Almirah Fresh No.43, Shelf No.5 11/16/2024 MCS38671
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,PAN (Browse shelf) Available Almirah Fresh No.43, Shelf No.4 MCS38672
Total holds: 0

Chapter 1 The Threat Environment (Page-1),Chapter 2 Planning and Policy (Page-59),
Chapter 3 Cryptography (Page-127), Chapter 4 Secure Networks (Page-191),Chapter 5 Access Control (Page-245),Chapter 6 Firewalls (Page-313), Chapter 7 Host Hardening (Page-375),Chapter 8 Application Security (Page-433),Chapter 9 Data Protection (Page-485),Chapter 10 Incident and Disaster Response (Page-541).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.