As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested conti
Securing the information infrastructure
โ Scribed by Kizza, Joseph Migga
- Publisher
- Hershey PA : CyberTech Publ.
- Year
- 2008
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Includes bibliographical references and index
๐ SIMILAR VOLUMES
As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested conti
Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology
It is widely believed, and increasingly documented, that the United States is vulnerable to various types of information warfare attacks. Threats range from nuisance attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. informa