๐”– Scriptorium
โœฆ   LIBER   โœฆ

Cover of Securing the information infrastructure
๐Ÿ“

Securing the information infrastructure

โœ Scribed by Kizza, Joseph Migga


Publisher
Hershey PA : CyberTech Publ.
Year
2008
Tongue
English
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Includes bibliographical references and index


๐Ÿ“œ SIMILAR VOLUMES


Securing the Information Infrastructure
โœ Joseph Migga Kizza & Florence Migga Kizza ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› IGI Global ๐ŸŒ English

As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested conti

Securing the Information Infrastructure
โœ Joseph M. Kizza, Florence M. Kizza ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐ŸŒ English

As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested conti

Communications and Information Infrastru
โœ John G. Voeller ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› John Wiley & Sons, Incorporated ๐ŸŒ English

Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology

Securing U.S. Defense Information Infras
โœ R.H. Anderson ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐Ÿ› Rand Publishing ๐ŸŒ English

It is widely believed, and increasingly documented, that the United States is vulnerable to various types of information warfare attacks. Threats range from nuisance attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. informa