LEADER 02066nam 2200409 450 001 9910830776903321 005 20231006123634.0 010 $a1-118-82065-7 035 $a(CKB)3710000000492866 035 $a(NjHacI)993710000000492866 035 $a(EXLCZ)993710000000492866 100 $a20231006d2014 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aComputer security handbook$hVolume 2 /$fedited by Seymour Bosworth, Michel E. Kabay, Eric Whyne 205 $aSixth edition. 210 1$aHoboken :$cJohn Wiley & Sons, Inc.,$d2014. 215 $a1 online resource $cillustrations 311 $a1-118-13411-7 320 $aIncludes bibliographical references and index. 327 $aVol. 1. [1140p.] -- vol. 2. [1200p.]. 330 $aComputer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more. 606 $aElectronic data processing departments$xSecurity measures 615 0$aElectronic data processing departments$xSecurity measures. 676 $a658.4/78 702 $aBosworth$b Seymour 702 $aKabay$b Michel E. 702 $aWhyne$b Eric 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910830776903321 996 $aComputer security handbook$92066238 997 $aUNINA