Narrow your search

Library

AP (15)

KDG (15)

KU Leuven (15)

Odisee (15)

Thomas More Kempen (15)

Thomas More Mechelen (15)

ULB (15)

ULiège (15)

VIVES (15)

UCLL (14)

More...

Resource type

book (29)

digital (15)


Language

English (39)


Year
From To Submit

2024 (3)

2023 (4)

2020 (3)

2019 (3)

2017 (4)

More...
Listing 1 - 10 of 39 << page
of 4
>>
Sort by
Computer Network Security
Author:
ISBN: 0387252282 0387204733 1441935436 Year: 2005 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. Yet despite the proliferation of expert remedies, a viable solution to these security issues remains elusive, and society continues to suffer at the hands of cyber vandalism and computer viruses. This comprehensive text outlines and discusses today’s most important issues and concerns in computer network and information safety and security, and promises to ignite debate and participation in the ongoing global security dialog Computer Network Security is foremost an educational tool that aims to explore computer network infrastructure and protocol design security flaws and discusses current security solutions and best practices. It explores the security threats and vulnerabilities in the current network infrastructure and protocols and outlines current efforts including: Access Control and Authorization, Cryptography, Firewalls and VPNs, Web Security and Content Filtering, among others. The text further discusses various security proposals including: * Raising awareness of the security problems in cyberspace, and, more particularly, computer network security * Starting a discussion on computer network infrastructure and protocol design flaws and vulnerabilities * Exploring the role of legislation and law enforcement in maintaining computer and computer network security * Proposing efficient and widely acceptable solutions and best practices to the security problem, and encouraging readers to investigate other possible solutions This text is an invaluable instructional and research tool for courses in computer and information security. Students or practitioners in computer science, information science, technology studies, library sciences, and information management studies will find this text particularly useful for their purposes. In addition, it is a rich resource for those looking to gain an understanding of computer infrastructures and network security threats.

Keywords

Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer Communication Networks. --- Information storage and retrieva. --- Computer science. --- Information Systems. --- Information Storage and Retrieval. --- Data Storage Representation. --- Management of Computing and Information Systems. --- Information storage and retrieval. --- Informatics --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Data structures (Computer science). --- Management information systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing --- Communication systems


Book
Ethical and social issues in the information age
Author:
ISBN: 1849960372 1849960399 1849960380 9786613563071 1280385154 Year: 2010 Publisher: London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ethical dilemmas have risen in number and intensity with the increasing dependence of contemporary society on computers and computer networks. Despite the proliferation of expert remedies, viable solutions to computer security issues remain too elusive, and society continues to suffer at the hands of cyber criminals, vandals, and hackers. This thoroughly revised and expanded fourth edition of the successful Ethical and Social Issues in the Information Age provides an up-to-date examination of the ethical, social, and policy challenges stemming from the emergence of cyberspace, the convergence of telecommunication and computing technologies, and the miniaturization of computing, telecommunication, and information-enabling devices. This accessible textbook/reference broadly surveys thought-provoking questions about the impact of these new technologies, with particular emphasis on the rapid growth of a multitude of computer networks, including the Internet. It assumes only a very modest familiarity with basic computer literacy. Topics and features: • Describes how changes in information technology influence morality and the law • Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism (NEW) • Offers a pertinent discussion on privacy, surveillance, civil liberties, harassment, and discrimination • Supplies an overview of the history of computing science in hardware, software, and networking (NEW) • Examines how developments in information technology have changed the traditional issues of intellectual property rights • Surveys the evolution of computer crimes, their types, costs on society, and strategies of detection and prevention, as well as techniques in electronic crime investigation • Discusses the new frontiers of ethics: virtual reality, artificial intelligence, and the Internet • Reviews the new realities of computer networks, and their implications for global ethics, culture, and economics (NEW) • Introduces the fundamentals of network-security system design and operation, revealing vulnerable areas in computer network infrastructure • Explores biometric techniques to system access control • Incorporates recent requirements for computer curricula • Provides exercises, objectives, and issues for discussion with every chapter This comprehensive text/reference provides updated discussion of the ethical and social issues that continue to evolve as computing and information technologies proliferate. Students at all levels who need to learn about computer ethics, the legal aspects of computing, network security, computer crime investigation, and biometrics will find this well-documented work an invaluable resource. The book is also highly useful for practitioners needing such insights for their work.


Book
Guide to Computer Network Security
Author:
ISBN: 1849968063 184800916X 1848009178 Year: 2009 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to suffer at the hands of cyber criminals, vandals and hackers. This authoritative Guide to Computer Network Security explores computer network infrastructures and protocol design security flaws, and discusses current security solutions and best practices in both fixed and mobile computer networks. The book broadly surveys thought-provoking security issues, discussing and raising questions about the impact of new technologies and protocols (with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies). It further explores the security threats and vulnerabilities in the current network infrastructure and protocols, and outlines current security efforts. The text assumes a modest familiarity with basic computer programming and networking. Features: • Covers the very core of network security, and includes chapters about the very latest in ‘handling disasters’ and ‘security in mobile network systems’ • Presents an in-depth discussion of standardization, again informing the reader on current trends on the topic • Raises awareness of the security problems in cyberspace, and more particularly, computer network security • Discusses computer network infrastructure and protocol design flaws and vulnerabilities • Explores the role of legislation and law enforcement in maintaining computer and computer network security • Proposes efficient and widely acceptable solutions and best practices to security problems, and encourages readers to investigate other possible solutions • Alerts the reader to the daunting security problems in increasingly popular mobile network systems • Includes two types of end-of-chapter exercises: quickly workable questions, as well as more thought-provoking advanced exercises • Devotes one complete chapter to lab exercises: weekly, semester assignments and hard open-research projects • Endeavours to use open source software tools throughout • Provides support materials for lecturers and students such as PowerPoint slides, syllabus suggestions, solutions, instructor manual and student laboratory materials This text/reference is an invaluable instructional and research tool for undergraduates in computer and information security. It is also a rich resource for practitioners, and professionals looking to gain an understanding of computer network infrastructure and information network security. Dr Joseph Migga Kizza has also written Computer Network Security and Ethical and Social Issues in the Information Age. Key Topics: Network Vulnerabilities Hostile Scripts Security Assessment Authentication Cryptography Computer and Network Forensics Network Security Protocols Security in Wireless and Sensor Networks.

Keywords

Computer networks -- Security measures. --- Computer security. --- Electronic books. -- local. --- Computer networks --- Telecommunications --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Information Storage and Retrieval. --- Data Storage Representation. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Computer security --- Data protection --- Security systems --- Hacking --- Information storage and retrieva. --- Information Systems. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval


Book
Guide to Computer Network Security
Author:
ISBN: 1447159985 1447145429 1447145437 Year: 2013 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before. This comprehensive and authoritative Guide to Computer Network Security exposes the various security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this much-anticipated new edition embraces a broader view of computer networks that encompasses new agile mobile systems and social networks. Topics and features: Provides supporting material for lecturers and students at an associated website, including an instructor’s manual, slides, solutions, and laboratory materials Includes both quickly-workable questions and more thought-provoking advanced exercises at the end of each chapter Devotes an entire chapter to laboratory exercises, offering both weekly and semester-long assignments, and hard open research projects Surveys known security threats, and discusses flaws and vulnerabilities in computer network infrastructures and protocols Reviews existing best practices, proposes practical and efficient solutions to security issues, and encourages readers to investigate alternative possible approaches Explores the role of legislation, regulation, and law enforcement in maintaining computer and computer network security Examines the impact of developments in virtualization, cloud computing, and mobile systems, which have extended the boundaries of the traditional computer network This unique text/reference is an essential instructional and research tool for undergraduates in computer science and engineering. It is also a valuable reference for practitioners involved in computer networks and data security.

Keywords

Computer crimes. --- Computer networks -- Security measures. --- Computer networks. --- Internet -- Moral and ethical aspects. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Security measures --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Information Storage and Retrieval. --- Data Storage Representation. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Information storage and retrieva. --- Information Systems. --- Informatics --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Security measures. --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems --- Distributed processing

Ethical and Social Issues in the Information Age
Author:
ISBN: 184628659X 1846286581 9781846286582 Year: 2007 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ethical dilemmas have risen in number and intensity with the increasing dependence of contemporary society on computers and computer networks. Despite the proliferation of expert remedies, viable solutions to computer security issues remain too elusive, and society continues to suffer at the hands of cyber criminals, vandals, and hackers. This comprehensive third edition of the successful Ethical and Social Issues in the Information Age takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence of cyberspace, the convergence of telecommunication and computing technologies, and the miniaturalization of computing, telecommunication, and information-enabling devices. This accessible volume broadly surveys thought-provoking questions about the impact of these new technologies, with particular emphasis on the rapid growth of a multitude of computer networks, including the Internet. It assumes only a very modest familiarity with the basic computer literacy. Topics and features: • Describes how changes in information technology influence morality and the law • Provides fundamental discussion of network-security system design and operation to reveal vulnerable areas in computer network infrastructure (NEW chapter) • Surveys the history of computing and the evolution of computer crimes • Explores biometric techniques to system access control (NEW chapter) • Incorporates recent requirements for computer curricula • Introduces and explores techniques in electronic crime investigation (NEW chapter) • Assesses workplace concerns related to privacy, surveillance, and virtual offices • Offers a pertinent discussion on civil liberties, harassment, and discrimination • Contains chapter-ending exercises, and the author provides instructor classroom support materials and teaching guides at his website This newly revised text/reference provides an updated discussion of the ethical and social issues that continue to evolve as computing and information technologies proliferate. Students at all levels who need to learn about computer ethics, the legal aspects of computing, network security, computer crime investigation, and biometrics will find this well documented work an invaluable resource. The book is also highly useful for practitioners needing such insights for their work. Supplementary material can be found at: www.utc.edu/faculty/Joseph-Kizza.

Ethical and social issues in the information age
Author:
ISBN: 0387982752 9780387982755 Year: 1998 Publisher: New York (N.Y.): Springer,


Book
Guide to Computer Network Security
Author:
ISBN: 3319556061 3319556053 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things. Topics and features: · Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies · Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment · Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems · Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW) · Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises · Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This essential guide serves as both a textbook and a reference “toolbox” on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers. Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module. .

Keywords

Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Information Storage and Retrieval. --- Data Storage Representation. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Information Systems. --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer security. --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Sociotechnical systems --- Information resources management --- Management --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing --- Communication systems


Book
Ethical and Social Issues in the Information Age
Author:
ISBN: 3319707124 3319707116 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to the ubiquitous portable devices we use to access it. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life. This thoroughly revised and updated sixth edition features two new chapters covering online harassment and cyberbullying, and the complex issues introduced by the emergence of the Internet of Things (IoT). Topics and features: Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism Offers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discrimination Examines the ethical, cultural and economic realities of mobile telecommunications, computer social network ecosystems, and virtualization technology Reviews issues of property rights, responsibility and accountability relating to information technology and software Explores the evolution of electronic crime, network security, and computer forensics Introduces the new frontiers of ethics: virtual reality, artificial intelligence, and the Internet Discusses the security quagmire of the IoT, and the growing threat of bullying facilitated by electronic technology (NEW) Provides exercises, objectives, and issues for discussion with every chapter This extensive textbook/reference addresses the latest curricula requirements for understanding the cultural, social, legal, and ethical issues in computer science and related fields, and offers invaluable advice for industry professionals wishing to put such principles into practice. Dr. Joseph Migga Kizza is a Professor and Head of the Department of Computer Science and Engineering at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer title Guide to Computer Network Security.

Keywords

Computer science. --- Philosophy. --- Data encryption (Computer science). --- User interfaces (Computer systems). --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- User Interfaces and Human Computer Interaction. --- Science and Technology Studies. --- Philosophy of Technology. --- Technology—Sociological aspects. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Mental philosophy --- Humanities --- Informatics --- Science --- Information technology --- Moral and ethical aspects. --- Social aspects. --- Application software. --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Cryptography. --- Human-computer interaction. --- Technology --- Computer and Information Systems Applications. --- Technology and civilization --- Science and society --- Sociology of science --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)


Book
Ethical and Secure Computing : A Concise Module
Author:
ISBN: 3030039374 3030039366 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres Describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties Examines intellectual property rights in the context of computing, including the risks and liabilities associated with software Discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health Reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination Considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies Includes learning objectives, discussion questions and exercises throughout the book This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks. Dr. Joseph Migga Kizza is Professor and Associate Dean of the College of Engineering and Computer Science, and former Director of the Center for Information Security and Assurance, at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer titlesEthical and Social Issues in the Information Age and Guide to Computer Network Security.


Book
Guide to Computer Network Security
Author:
ISBN: 3030381412 3030381404 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the full range of security risks and vulnerabilities in all connected digital systems Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Describes the fundamentals of traditional computer network security, and common threats to security Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.

Keywords

Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information storage and retrieval. --- Data structures (Computer science). --- Management information systems. --- Computer science. --- Computer communication systems. --- Information Storage and Retrieval. --- Data Storage Representation. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing --- Communication systems --- Information storage and retrieval systems. --- Information retrieval. --- Computer architecture. --- Computer networks. --- IT Operations. --- Management. --- Architecture, Computer --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data centers --- Digital libraries --- Information organization --- Information retrieval

Listing 1 - 10 of 39 << page
of 4
>>
Sort by