000 01724cam a22003737i 4500
001 19077532
005 20240620020013.0
008 160429s2016 inua 001 0 eng
010 _a
020 _a9780137984787
020 _a078975746X
035 _a(OCoLC)ocn952669658
040 _aSISPL
_beng
_cSISPL
_erda
_dOCLCF
_dYDX
_dLTSCA
_dHF9
_dLND
_dI8M
_dOCLCA
_dDLC
042 _alccopycat
050 0 0 _aQA76.9.A25
_bE27 2023
082 0 4 _a005.8
_223
100 1 _aEasttom, Chuck,
_eauthor.
245 1 0 _aComputer security fundamentals /
_cChuck Easttom.
250 _a5th ed.
260 _aHarlow, Essex:
_bPearson,
_cc2023
300 _axxix, 548 p. :
_billustrations ;
_c25 cm
500 _aIncludes index.
505 0 _aIntroduction to Computer Security -- Networks and the Internet -- Cyber Stalking, Fraud and Abuse -- Denial of Service Attacks -- Malware -- Techniques used by Hackers -- Industrial Espionage in Cyberspace -- Encryption -- Computer Security Software -- Security Policies -- Network Scanning and Vulnerability Scanning -- Cyber Terrorism and Information Warfare -- Cyber Detective -- Introduction to Forensics
650 0 _aComputer security.
_91473
650 0 _aComputer networks
_xSecurity measures.
_91698
650 4 _aSeguridad informática.
650 4 _aRedes de computadoras
_xMedidas de seguridad.
650 7 _aComputer networks
_xSecurity measures.
_2fast
_91698
650 7 _aComputer security.
_2fast
_91473
856 4 1 _uhttp://catalogue.londonmet.ac.uk/record=b1789897~S1
_zE-book
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2lcc
_cBK
_hQA76.9.A25
_kQA76.9.A25
_m.E27 2023
_01
999 _c5890
_d5890