000 | 01694cam a2200325 a 4500 | ||
---|---|---|---|
001 | 9345094 | ||
003 | BD-DhUL | ||
005 | 20150129210834.0 | ||
006 | m d | ||
007 | cr n | ||
008 | 101020s2011 njua sb 001 0 eng d | ||
020 | _a9780470626399 (hardback) | ||
035 | _a(WaSeSS)ssj0000523419 | ||
040 |
_aDLC _cDLC _dDLC _dWaSeSS _dBD-DhUL |
||
042 | _apcc | ||
050 | 4 |
_aQA76.9.A25 _bS69 2011 |
|
082 | 0 | 0 |
_a005.8 _222 _bSTI |
084 |
_aCOM053000 _2bisacsh |
||
100 | 1 | _aStamp, Mark. | |
210 | 1 | 0 | _aInformation security |
245 | 1 | 0 |
_aInformation security : _bprinciples and practice / _cMark Stamp. |
250 | _a2nd ed. | ||
260 |
_aHoboken, NJ : _bWiley, _cc2011. |
||
504 | _aIncludes bibliographical references (p. 531-571) and index. | ||
506 | _aLicense restrictions may limit access. | ||
520 |
_a"Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"-- _cProvided by publisher. |
||
650 | 0 | _aComputer security. | |
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh. |
|
942 |
_2ddc _cBK |
||
999 |
_c1290 _d1290 |