Computer Systems Security Planning for Success
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evol...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Newark, NJ
Ryan Tolboom
|
Series: | Open textbook library.
|
Subjects: | |
Online Access: | Access online version |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | OTLid0001355 | ||
003 | MnU | ||
005 | 20240122191922.0 | ||
006 | m o d s | ||
007 | cr | ||
008 | 230306suuuu mnu o 0 0 eng d | ||
040 | |a MnU |b eng |c MnU | ||
050 | 4 | |a QA76 | |
050 | 4 | |a QA76 | |
100 | 1 | |a Tolboom, Ryan |e author | |
245 | 0 | 0 | |a Computer Systems Security |b Planning for Success |c Ryan Tolboom |
264 | 2 | |a Minneapolis, MN |b Open Textbook Library | |
264 | 1 | |a Newark, NJ |b Ryan Tolboom | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 0 | |a Open textbook library. | |
505 | 0 | |a Legal -- Acknowledgements -- Instructional Notes -- 1. Introduction -- 2. Cryptography -- 3. Malware -- 4. Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. Vulnerability Management and Compliance -- 9. Incident Response and Continuity -- 10. Virtualization | |
520 | 0 | |a The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures. | |
542 | 1 | |f Attribution-NonCommercial-ShareAlike | |
546 | |a In English. | ||
588 | 0 | |a Description based on print resource | |
650 | 0 | |a Computer Science |v Textbooks | |
650 | 0 | |a Information technology |v Textbooks | |
650 | 0 | |a Cryptography |v Textbooks | |
710 | 2 | |a Open Textbook Library |e distributor | |
856 | 4 | 0 | |u https://open.umn.edu/opentextbooks/textbooks/1355 |z Access online version |