0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.) Loot Price: R4,154
Discovery Miles 41 540
Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.): Joachim Biskup

Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.)

Joachim Biskup

 (sign in to rate)
Loot Price R4,154 Discovery Miles 41 540 | Repayment Terms: R389 pm x 12*

Bookmark and Share

Expected to ship within 18 - 22 working days

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, "computing" refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

General

Imprint: Springer-Verlag
Country of origin: Germany
Release date: November 2008
First published: November 2008
Authors: Joachim Biskup
Dimensions: 235 x 155 x 38mm (L x W x T)
Format: Hardcover
Pages: 694
Edition: 2009 ed.
ISBN-13: 978-3-540-78441-8
Categories: Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Promotions
LSN: 3-540-78441-1
Barcode: 9783540784418

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,827 Discovery Miles 38 270
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,353 R1,131 Discovery Miles 11 310
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R775 Discovery Miles 7 750
Cybersecurity Law, Third Edition
J Kosseff Hardcover R2,540 Discovery Miles 25 400

See more

Partners