Principles and practice of information security : protecting computers from hackers and lawyers /
13
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
Upper Saddle River, N.J. : Pearson/Prentice Hall,
2004
|
Subjects: |
_version_ | 1796706228247724032 |
---|---|
author | 183119 Volonino, Linda Robinson, Stephen R. Volonino, Charles P. |
author_facet | 183119 Volonino, Linda Robinson, Stephen R. Volonino, Charles P. |
author_sort | 183119 Volonino, Linda |
collection | OCEAN |
description | 13 |
first_indexed | 2024-03-05T03:20:49Z |
format | |
id | KOHA-OAI-TEST:297120 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T03:20:49Z |
publishDate | 2004 |
publisher | Upper Saddle River, N.J. : Pearson/Prentice Hall, |
record_format | dspace |
spelling | KOHA-OAI-TEST:2971202020-12-19T17:09:48ZPrinciples and practice of information security : protecting computers from hackers and lawyers / 183119 Volonino, Linda Robinson, Stephen R. Volonino, Charles P. Upper Saddle River, N.J. : Pearson/Prentice Hall,2004eng13PSZJBLComputer networksInternetComputer securityURN:ISBN:0131840274 (pbk.) |
spellingShingle | Computer networks Internet Computer security 183119 Volonino, Linda Robinson, Stephen R. Volonino, Charles P. Principles and practice of information security : protecting computers from hackers and lawyers / |
title | Principles and practice of information security : protecting computers from hackers and lawyers / |
title_full | Principles and practice of information security : protecting computers from hackers and lawyers / |
title_fullStr | Principles and practice of information security : protecting computers from hackers and lawyers / |
title_full_unstemmed | Principles and practice of information security : protecting computers from hackers and lawyers / |
title_short | Principles and practice of information security : protecting computers from hackers and lawyers / |
title_sort | principles and practice of information security protecting computers from hackers and lawyers |
topic | Computer networks Internet Computer security |
work_keys_str_mv | AT 183119voloninolinda principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers AT robinsonstephenr principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers AT voloninocharlesp principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers |