000 01443cam a2200313 a 4500
999 _c2968
_d2968
001 3999093
003 ZET-ke
005 20240920020003.0
008 960711s1997 njua b 001 0 eng
010 _a 96032910
020 _a0131201999
020 _a9780131201996
040 _aDLC
_cZET-ke
_dDLC
050 0 0 _aQA76.9.A25
_bP45 2003
082 0 0 _a005.8
_220
100 1 _aPfleeger, Charles P.,
_d1948-
_93954
245 1 0 _aSecurity in computing /
_cCharles P. Pfleeger.
250 _a3rd ed.
260 _aUpper Saddle River, NJ :
_bPrentice Hall PTR,
_cc2003.
300 _axvii,746 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references (p. 537-559) and index.
505 _aIs there a security problem in computing? -- Elementary cryptography -- Program security -- Protection in general-purpose operating systems -- Designing trusted operating systems -- Database security -- Security in networks -- Administering security -- Legal,privacy, and ethical issues in computer security -- Cryptography explained.
650 0 _aComputer security.
_91473
650 0 _aData protection.
_93955
650 0 _aPrivacy, Right of.
_93956
906 _a7
_bcbc
_corignew
_d1
_eocip
_f19
_gy-gencatlg
942 _2lcc
_cBK
_hQA76.9.A25
_iP45 2003
_kQA76.9.A25
_mP45 2003
_05