Author: Gerald D. Cole
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 188
Book Description
Design Alternatives for Computer Network Security
Author: Gerald D. Cole
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 188
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 188
Book Description
NBS Special Publication
Author:
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 548
Book Description
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 548
Book Description
Audit and evaluation of computer security
Author: Anthony J. Barbera
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 1060
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 1060
Book Description
Federal Information Processing Standards Publication
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 796
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 796
Book Description
Computer Security
Author: John S. Potts
Publisher: Nova Publishers
ISBN: 9781590335215
Category : Computers
Languages : en
Pages : 158
Book Description
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.
Publisher: Nova Publishers
ISBN: 9781590335215
Category : Computers
Languages : en
Pages : 158
Book Description
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.
Selected Library Acquisitions
Author: United States. Department of Transportation
Publisher:
ISBN:
Category :
Languages : en
Pages : 504
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 504
Book Description
Annotated Bibliography of the Literature on Resource Sharing Computer Networks
Author: Helen M. Wood
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 184
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 184
Book Description
The Network Security Center
Author: Frank Heinrich
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 76
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 76
Book Description
Journal of Research of the National Bureau of Standards
Author: United States. National Bureau of Standards
Publisher:
ISBN:
Category : Chemistry
Languages : en
Pages : 912
Book Description
Publisher:
ISBN:
Category : Chemistry
Languages : en
Pages : 912
Book Description
Democratizing Cryptography
Author: Rebecca Slayton
Publisher: Morgan & Claypool
ISBN: 1450398286
Category : Computers
Languages : en
Pages : 558
Book Description
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders’ perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.
Publisher: Morgan & Claypool
ISBN: 1450398286
Category : Computers
Languages : en
Pages : 558
Book Description
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders’ perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.