000 02121cam a2200301 i 4500
999 _c30885
_d30885
003 CUTN
005 20190912172125.0
008 141022t20162016maua 001 0 eng
020 _a9781284055931 (pbk.)
041 _aEnglish
042 _apcc
082 0 0 _a005.8
_223
_bSMI
100 1 _aSmith, Richard E.,
245 1 0 _aElementary information security /
_cRichard E. Smith.
250 _aSecond edition.
260 _aBurlington, MA :
_bJones & Bartlett Learning,
_c©2016
300 _axxi, 866 pages :
_billustrations ;
_c24 cm
500 _aIncludes index.
505 _tChapter 1. Security from the Ground Up
_tChapter 2. Controlling a Computer
_tChapter 3. Controlling Files
_tChapter 4. Sharing Files
_tChapter 5. Storing Files
_tChapter 6. Authenticating People
_tChpater 7. Encrypting Files
_tChapter 8. Secret and Public Keys
_tChapter 9. Encrypting Volumes
_tChapter 10. Connecting Computers
_tChapter 11. Networks of Networks
_tChapter 12. End-to-End Networking
_tChapter 13. Enterprise Computing
_tChapter 14. Network Encryption
_tChapter 15. Internet Services and Email
_tChapter 16. The world Wide Web
_tChapter 17. Governments and Secrecy
520 _a"An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Second Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems."--
650 0 _aComputer security.
650 0 _aComputer networks
942 _2ddc
_cBOOKS
100 1 _d1952-
650 0 _xSecurity measures.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg