000 01382nam a22003135i 4500
001 22984967
005 20240828132542.0
008 230223s2023 mau 000 0 eng
010 _a 2023933248
020 _a9780137891214
_q(paperback)
020 _z9780137891252
_q(epub)
020 _z9780137891306
_q(Adobe pdf)
040 _aDLC
_beng
_erda
_cDLC
042 _apcc
082 _a005.8,PFL
100 1 _aPfleeger, Charles P.,
_eauthor.
_995108
245 1 0 _aSecurity in computing /
_cCharles P. Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp.
250 _aSixth edition.
263 _a2307
264 1 _aBoston :
_bAddison-Wesley,
_c2023.
300 _apages cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
505 _aIntroduction (Page-1), Toolbox: Authentication, Access Control, and Cryptography (Page-38), Programs and Programming (Page-141), The Internet—User Side (Page-248), Operating Systems (Page-323), Networks (Page-385), Data and Databases (Page-549), New Territory (Page-601), Privacy (Page-659), Management and Incidents (Page-727), Legal Issues and Ethics (Page-781), Details of Cryptography (Page-850), Emerging Topics (Page-895).
700 1 _aPfleeger, Shari Lawrence,
_eauthor.
_96083
700 1 _aColes-Kemp, Lizzie,
_eauthor.
_9125436
942 _cREF
_2ddc
999 _c611188
_d611188