Securing the information infrastructure
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher.
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, PA :
Cybertech Pub.,
c2008.
|
Subjects: | |
Online Access: | View fulltext via EzAccess MyiLibrary |
LEADER | 02417cam a2200529Ia 4500 | ||
---|---|---|---|
001 | 310 | ||
003 | OCoLC | ||
005 | 20130710235918.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 071020s2008 paua ob 001 0 eng d | ||
019 | # | # | |a 187424361 |a 191081473 |
020 | # | # | |a 9781599043814 (electronic bk.) |
020 | # | # | |a 1599043815 (electronic bk.) |
020 | # | # | |a 9781599043791 |
020 | # | # | |a 1599043793 |
029 | 1 | # | |a NZ1 |b 12187238 |
035 | # | # | |a (OCoLC)175289238 |
040 | # | # | |a N$T |b eng |c N$T |d COCUF |d NTG |d OCLCQ |d IDEBK |d OCLCQ |d OCLCO |d OCLCQ |
049 | # | # | |a MYTA |
050 | # | 4 | |a HV6773 |b .K59 2008eb |
072 | # | 7 | |a COM |x 060040 |2 bisacsh |
072 | # | 7 | |a COM |x 043050 |2 bisacsh |
072 | # | 7 | |a COM |x 053000 |2 bisacsh |
082 | 0 | 4 | |a 005.8 |2 22 |
100 | 1 | # | |a Kizza, Joseph Migga. |
245 | 1 | 0 | |a Securing the information infrastructure |c Joseph M. Kizza, Florence M. Kizza. |h [electronic resource] / |
260 | # | # | |a Hershey, PA : |b Cybertech Pub., |c c2008. |
300 | # | # | |a 1 online resource (xiv, 368 p.) : |b ill. |
504 | # | # | |a Includes bibliographical references and index. |
520 | # | # | |a "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher. |
588 | # | # | |a Description based on print version record. |
650 | # | 0 | |a Cyberterrorism. |
650 | # | 0 | |a Internet |x Security measures. |
650 | # | 0 | |a Computer networks |x Security measures. |
650 | # | 0 | |a Information superhighway |x Security measures. |
650 | # | 7 | |a COMPUTERS |x Security. |x Internet |2 bisacsh |
650 | # | 7 | |a COMPUTERS |x Security. |x Networking |2 bisacsh |
650 | # | 7 | |a COMPUTERS |x General. |x Security |2 bisacsh |
655 | # | 4 | |a Electronic books. |
700 | 1 | # | |a Kizza, Florence Migga. |
776 | 0 | 8 | |a Kizza, Joseph Migga. |d Hershey, PA : Cybertech Pub., c2008 |i Print version: |t Securing the information infrastructure. |w (OCoLC)85833270 |w (DLC) 2007007405 |z 1599043793 |z 9781599043791 |
856 | 4 | 0 | |u https://ezaccess.library.uitm.edu.my/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=203785 |z View fulltext via EzAccess |
856 | 4 | 0 | |u https://ezaccess.library.uitm.edu.my/login?url=http://www.myilibrary.com?id=95528 |3 MyiLibrary |
938 | # | # | |a EBSCOhost |b EBSC |n 203785 |
999 | # | # | |z 635090427471820035 |