0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.) Loot Price: R4,504
Discovery Miles 45 040
Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.): Joachim Biskup

Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.)

Joachim Biskup

 (sign in to rate)
Loot Price R4,504 Discovery Miles 45 040 | Repayment Terms: R422 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, "computing" refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

General

Imprint: Springer-Verlag
Country of origin: Germany
Release date: November 2008
First published: November 2008
Authors: Joachim Biskup
Dimensions: 235 x 155 x 38mm (L x W x T)
Format: Hardcover
Pages: 694
Edition: 2009 ed.
ISBN-13: 978-3-540-78441-8
Categories: Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Promotions
LSN: 3-540-78441-1
Barcode: 9783540784418

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,406 R1,302 Discovery Miles 13 020
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,692 Discovery Miles 66 920
Alice and Bob Learn Application Security
T Janca Paperback R1,084 R924 Discovery Miles 9 240
Technical Articles about the Voynich…
National Security Agency Hardcover R630 Discovery Miles 6 300
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
New Research on the Voynich Manuscript…
National Security Agency Hardcover R568 Discovery Miles 5 680
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210

See more

Partners