Ebook361 pages9 hours
Computer Security
Rating: 0 out of 5 stars
()
About this ebook
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers. Part V explains systems security, its access control, and integrity. The text is recommended for people involved in the promotion of computer security, especially programmers and IT practitioners, in institutions where computer-processed information is crucial and must be protected.
Author
John M. Carroll
John M. Carroll is Professor of Computer Science, Education, and Psychology, and Director of the Center for Human-Computer Interaction, at Virginia Tech. He has written more than 250 technical papers, more than 25 conference plenary addresses, and 12 books. He serves on 10 editorial boards for journals and handbooks, has won the Rigo Career Achievement Award from ACM, received the Silver Core Award from IFIP, and is a member of the CHI Academy.
Read more from John M. Carroll
Confidential Information Sources: Public and Private Rating: 0 out of 5 stars0 ratingsUsability Engineering: Scenario-Based Development of Human-Computer Interaction Rating: 4 out of 5 stars4/5
Related to Computer Security
Related ebooks
Network Security Traceback Attack and React in the United States Department of Defense Network Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Security Fundamentals: For Windows 2003 SP1 and R2 Rating: 0 out of 5 stars0 ratingsComputer and Information Security Handbook Rating: 2 out of 5 stars2/5Physical Security for IT Rating: 5 out of 5 stars5/5CompTIA Security+ Certification Study Guide: Network Security Essentials Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsApple macOS and iOS System Administration: Integrating and Supporting iPhones, iPads, and MacBooks Rating: 0 out of 5 stars0 ratingsTrojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code Rating: 4 out of 5 stars4/5Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsSeven Deadliest Unified Communications Attacks Rating: 0 out of 5 stars0 ratingsSecure Your Network for Free Rating: 5 out of 5 stars5/5Client-Side Attacks and Defense Rating: 0 out of 5 stars0 ratingsHack Proofing Your Network Rating: 0 out of 5 stars0 ratingsLinux+ Study Guide: Exam: XK0-001 Rating: 5 out of 5 stars5/5CompTIA Linux+ and LPIC Practice Tests: Exams LX0-103/LPIC-1 101-400, LX0-104/LPIC-1 102-400, LPIC-2 201, and LPIC-2 202 Rating: 0 out of 5 stars0 ratingsSecurity Sage's Guide to Hardening the Network Infrastructure Rating: 0 out of 5 stars0 ratingsCybersecurity Charter Standard Requirements Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsSecuring Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Rating: 0 out of 5 stars0 ratingsDesigning a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events Rating: 0 out of 5 stars0 ratingsImplementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines Rating: 0 out of 5 stars0 ratingsHack Proofing Your Web Applications: The Only Way to Stop a Hacker Is to Think Like One Rating: 0 out of 5 stars0 ratingsDigital Forensics Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response Rating: 4 out of 5 stars4/5CompTIA Linux+ Practice Tests: Exam XK0-004 Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsNetwork and System Security Rating: 4 out of 5 stars4/5Securing Windows: How to Protect Your Computer Properly Rating: 0 out of 5 stars0 ratings
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5
Reviews for Computer Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Computer Security - John M. Carroll
Enjoying the preview?
Page 1 of 1