Security in computing
This revision of the classic computer security book provides an overview of all types of computer security from centralized systems to distributed networks.
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
Englewood Cliffs, N.J.
Prentice-Hall
1989
©1989 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-186700 | ||
005 | 202210151160 | ||
020 | 0 | 0 | |a 0137989431 |q paperback |
040 | # | # | |a UiTM |b eng |c UiTM |e rda |
090 | 0 | 0 | |a QA76.9.A25 |b P45 1989 |
100 | 1 | 0 | |a Pfleeger, Charles P. |c 1948- |e author |
245 | 1 | 0 | |a Security in computing |c Charles P. Pfleeger |
264 | # | 1 | |a Englewood Cliffs, N.J. |b Prentice-Hall |c 1989 |
264 | # | 1 | |c ©1989 |
300 | 0 | 0 | |a xxi, 538 pages |b illustrations |c 25 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
500 | 0 | 0 | |a NO. RAK : 663 |
504 | 0 | 0 | |a Includes bibliographical references (page 519-531) and indexes |
520 | # | # | |a This revision of the classic computer security book provides an overview of all types of computer security from centralized systems to distributed networks. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Privacy, Right of |
650 | # | 0 | |a Data protection |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=186700 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00520##a007.2||00520##b007.2|| |