Advances in cyber security : technology, operation, and experiences / edited by D. Frank Hsu and Dorothy Marinucci.
Material type: TextPublisher: New York : Fordham University Press, 2013Description: xi, 257 pages : illustrations (black and white) ; 24 cmContent type: text | still image Media type: unmediated Carrier type: volumeISBN: 9780823244560 (hbk.) :; 9780823244577 (pbk.) :Subject(s): Computer security | Computer crimes | Computers and IT | Computers and ITDDC classification: 005.8 Summary: The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. This book collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem.Item type | Current library | Home library | Shelving location | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|---|
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 005.8 ADV (Browse shelf(Opens below)) | Available | 06140378 | |||
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 005.8 ADV (Browse shelf(Opens below)) | Available | 06456227 | |||
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 005.8 ADV (Browse shelf(Opens below)) | Available | 06456235 |
Total reservations: 0
Browsing Paul Hamlyn Library shelves, Shelving location: Floor 1 Close shelf browser (Hides shelf browser)
Includes bibliographical references and index.
The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. This book collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem.
Specialized.
There are no comments on this title.
Log in to your account to post a comment.