Design Alternatives for Computer Network Security

Design Alternatives for Computer Network Security PDF Author: Gerald D. Cole
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 188

Get Book Here

Book Description

Design Alternatives for Computer Network Security

Design Alternatives for Computer Network Security PDF Author: Gerald D. Cole
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 188

Get Book Here

Book Description


NBS Special Publication

NBS Special Publication PDF Author:
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 548

Get Book Here

Book Description


Audit and evaluation of computer security

Audit and evaluation of computer security PDF Author: Anthony J. Barbera
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 1060

Get Book Here

Book Description


Federal Information Processing Standards Publication

Federal Information Processing Standards Publication PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 796

Get Book Here

Book Description


Computer Security

Computer Security PDF Author: John S. Potts
Publisher: Nova Publishers
ISBN: 9781590335215
Category : Computers
Languages : en
Pages : 158

Get Book Here

Book Description
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.

Selected Library Acquisitions

Selected Library Acquisitions PDF Author: United States. Department of Transportation
Publisher:
ISBN:
Category :
Languages : en
Pages : 504

Get Book Here

Book Description


The Network Security Center

The Network Security Center PDF Author: Frank Heinrich
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 76

Get Book Here

Book Description


Annotated Bibliography of the Literature on Resource Sharing Computer Networks

Annotated Bibliography of the Literature on Resource Sharing Computer Networks PDF Author: Helen M. Wood
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 184

Get Book Here

Book Description


Journal of Research of the National Bureau of Standards

Journal of Research of the National Bureau of Standards PDF Author: United States. National Bureau of Standards
Publisher:
ISBN:
Category : Chemistry
Languages : en
Pages : 912

Get Book Here

Book Description


Democratizing Cryptography

Democratizing Cryptography PDF Author: Rebecca Slayton
Publisher: Morgan & Claypool
ISBN: 1450398286
Category : Computers
Languages : en
Pages : 558

Get Book Here

Book Description
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders’ perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.