//]]>
Item type | Location | Call Number | Status | Notes | Date Due |
---|---|---|---|---|---|
Book | AUM Main Library English Collections Hall | 005.8 S782 (Browse Shelf) | Available | JBC/2011/14004 | |
Book | AUM Main Library English Collections Hall | 005.8 S782 (Browse Shelf) | Available | JBC/2011/14004 |
Includes bibliographical references and index.
Cryptographic tools -- User authentication -- Access control -- Database security -- Malicious software -- Denial-of-service attacks -- Intrusion detection -- Firewalls and intrusion prevention systems -- Buffer overflow -- Software security -- Operating system security -- Trusted computing and multilevel security -- IT security management and risk assessment -- IT security controls, plans, and procedures -- Physical and infrastructure security -- Human resources security -- Security auditing -- Legal and ethical aspects -- Symmetric encryption and message confidentiality -- Public-key cryptography and message authentication -- Internet security protocols and standards -- Internet authentication applications -- Wireless network security -- Appendix A. Projects and other student exercises for teaching computer security.
There are no comments for this item.