Principles and practice of information security : protecting computers from hackers and lawyers /

13

Bibliographic Details
Main Authors: 183119 Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.
Format:
Language:eng
Published: Upper Saddle River, N.J. : Pearson/Prentice Hall, 2004
Subjects:
_version_ 1796706228247724032
author 183119 Volonino, Linda
Robinson, Stephen R.
Volonino, Charles P.
author_facet 183119 Volonino, Linda
Robinson, Stephen R.
Volonino, Charles P.
author_sort 183119 Volonino, Linda
collection OCEAN
description 13
first_indexed 2024-03-05T03:20:49Z
format
id KOHA-OAI-TEST:297120
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T03:20:49Z
publishDate 2004
publisher Upper Saddle River, N.J. : Pearson/Prentice Hall,
record_format dspace
spelling KOHA-OAI-TEST:2971202020-12-19T17:09:48ZPrinciples and practice of information security : protecting computers from hackers and lawyers / 183119 Volonino, Linda Robinson, Stephen R. Volonino, Charles P. Upper Saddle River, N.J. : Pearson/Prentice Hall,2004eng13PSZJBLComputer networksInternetComputer securityURN:ISBN:0131840274 (pbk.)
spellingShingle Computer networks
Internet
Computer security
183119 Volonino, Linda
Robinson, Stephen R.
Volonino, Charles P.
Principles and practice of information security : protecting computers from hackers and lawyers /
title Principles and practice of information security : protecting computers from hackers and lawyers /
title_full Principles and practice of information security : protecting computers from hackers and lawyers /
title_fullStr Principles and practice of information security : protecting computers from hackers and lawyers /
title_full_unstemmed Principles and practice of information security : protecting computers from hackers and lawyers /
title_short Principles and practice of information security : protecting computers from hackers and lawyers /
title_sort principles and practice of information security protecting computers from hackers and lawyers
topic Computer networks
Internet
Computer security
work_keys_str_mv AT 183119voloninolinda principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers
AT robinsonstephenr principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers
AT voloninocharlesp principlesandpracticeofinformationsecurityprotectingcomputersfromhackersandlawyers