๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Securing the Information Infrastructure

โœ Scribed by Joseph Migga Kizza & Florence Migga Kizza


Publisher
IGI Global
Year
2007
Tongue
English
Leaves
387
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested continuously.

Securing the Information Infrastructure provides a framework for building trust in computer technology by exploring an array of safeguards that can be used to uphold the integrity and reliability of computing systems. This book challenges readers to examine rapid advances in information technology to recognize its misuse in society, covering such pressing topics as computer ethics, computer network security, and computer forensics.


๐Ÿ“œ SIMILAR VOLUMES


Securing the Information Infrastructure
โœ Joseph M. Kizza, Florence M. Kizza ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐ŸŒ English

As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested conti

Communications and Information Infrastru
โœ John G. Voeller ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› John Wiley & Sons, Incorporated ๐ŸŒ English

Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology

Securing U.S. Defense Information Infras
โœ R.H. Anderson ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐Ÿ› Rand Publishing ๐ŸŒ English

It is widely believed, and increasingly documented, that the United States is vulnerable to various types of information warfare attacks. Threats range from nuisance attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. informa