Cargando…
Computer and information security handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent adv...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2012
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1568598 |
_version_ | 1780931004971614208 |
---|---|
author | Vacca, John R Vacca, John R |
author_facet | Vacca, John R Vacca, John R |
author_sort | Vacca, John R |
collection | CERN |
description | The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed |
id | cern-1568598 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2012 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-15685982021-04-21T22:33:13Zhttp://cds.cern.ch/record/1568598engVacca, John RVacca, John RComputer and information security handbookComputing and ComputersThe second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributedElsevieroai:cds.cern.ch:15685982012 |
spellingShingle | Computing and Computers Vacca, John R Vacca, John R Computer and information security handbook |
title | Computer and information security handbook |
title_full | Computer and information security handbook |
title_fullStr | Computer and information security handbook |
title_full_unstemmed | Computer and information security handbook |
title_short | Computer and information security handbook |
title_sort | computer and information security handbook |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1568598 |
work_keys_str_mv | AT vaccajohnr computerandinformationsecurityhandbook AT vaccajohnr computerandinformationsecurityhandbook |