Ebook361 pages9 hours
Computer Security
Rating: 0 out of 5 stars
()
About this ebook
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers. Part V explains systems security, its access control, and integrity. The text is recommended for people involved in the promotion of computer security, especially programmers and IT practitioners, in institutions where computer-processed information is crucial and must be protected.
Author
John M. Carroll
John M. Carroll is Professor of Computer Science, Education, and Psychology, and Director of the Center for Human-Computer Interaction, at Virginia Tech. He has written more than 250 technical papers, more than 25 conference plenary addresses, and 12 books. He serves on 10 editorial boards for journals and handbooks, has won the Rigo Career Achievement Award from ACM, received the Silver Core Award from IFIP, and is a member of the CHI Academy.
Read more from John M. Carroll
Confidential Information Sources: Public and Private Rating: 0 out of 5 stars0 ratingsUsability Engineering: Scenario-Based Development of Human-Computer Interaction Rating: 4 out of 5 stars4/5
Related to Computer Security
Related ebooks
Network Security Traceback Attack and React in the United States Department of Defense Network Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Security Fundamentals: For Windows 2003 SP1 and R2 Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsPhysical Security for IT Rating: 5 out of 5 stars5/5Computer and Information Security Handbook Rating: 2 out of 5 stars2/5Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code Rating: 4 out of 5 stars4/5Client-Side Attacks and Defense Rating: 0 out of 5 stars0 ratingsSeven Deadliest Unified Communications Attacks Rating: 0 out of 5 stars0 ratingsCyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSecure Your Network for Free Rating: 5 out of 5 stars5/5CompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsConquer the Web: The Ultimate Cybersecurity Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Charter Standard Requirements Rating: 0 out of 5 stars0 ratingsNational Cyber Security Division Second Edition Rating: 0 out of 5 stars0 ratingsCompTIA Linux+ and LPIC Practice Tests: Exams LX0-103/LPIC-1 101-400, LX0-104/LPIC-1 102-400, LPIC-2 201, and LPIC-2 202 Rating: 0 out of 5 stars0 ratingsCyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity Sage's Guide to Hardening the Network Infrastructure Rating: 0 out of 5 stars0 ratingsCombating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Rating: 4 out of 5 stars4/5Incident Response Team A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsLinux+ Study Guide: Exam: XK0-001 Rating: 5 out of 5 stars5/5SIEM Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsHow to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsImplementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines Rating: 0 out of 5 stars0 ratingsDigital Forensics Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsVirtual Machines A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Destination CISSP Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsMike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5
Reviews for Computer Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Computer Security - John M. Carroll
Enjoying the preview?
Page 1 of 1