A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications …
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer …
J Shim, AA Qureshi, JG Siegel - 2013 - taylorfrancis.com
The International Handbook of Computer Security is designed to help information systems/computer professionals as well as business executives protect computer systems …
Computer networks are proliferating rapidly for a number of reasons discussed in this paper. During this boom, relatively little attention has been paid to computer network security. This …
RC Summers - IBM Systems Journal, 1984 - ieeexplore.ieee.org
Presented is an overview of computer security, including concepts, techniques, and mea- sures relating to the protection of computing systems and the information they maintain …
G Whitson - Journal of computing sciences in colleges, 2003 - dl.acm.org
The Internet backbone servers were attacked and Web traffic slowed for a few hours, the Nimbda worm used Microsoft Web servers to infect all those downloading Web pages until …
FM Avolio - NETWORK COMPUTING-MANHASSET NY-, 2000 - hackerproof.org
Information systems security. Computer and network security. Internet security. It's a complex world, and growing more so every day. With these changes, some truths and approaches to …
" In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity …
M Andrews, JA Whittaker - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Computer security Page 1 Basic Training Editors: James A. Whittaker, jw@se.fit.edu Michael Howard, mikehow@microsoft.com more than cryptography and networking …