Securing the information infrastructure

Book Cover
Average Rating
Publisher:
Cybertech Pub.,
Pub. Date:
c2008.
Language:
English
Description
As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested continuously. Securing the Information Infrastructure provides a framework for building trust in computer technology by exploring an array of safeguards that can be used to uphold the integrity and reliability of computing systems. This book challenges readers to examine rapid advances in information technology to recognize its misuse in society, covering such pressing topics as computer ethics, computer network security, and computer forensics.
More Details
Contributors:
ISBN:
9781599043791
9781599043814
Also in this Series
More Like This
Reviews from GoodReads
Loading GoodReads Reviews.
Staff View

Grouping Information

Grouped Work ID d6f9b9c3-ce54-b834-2dea-f0e6918563d3
full_title securing the information infrastructure
author kizza joseph migga
grouping_category book
lastUpdate 2017-08-14 05:04:17AM

Solr Details

_version_ 1579501697343946752
accelerated_reader_interest_level
accelerated_reader_point_value 0
accelerated_reader_reading_level 0
author Kizza, Joseph Migga.
author-letter Kizza, Joseph Migga.
author2 NetLibrary, Inc.
author2-role NetLibrary, Inc.
author_additional Joseph M. Kizza, Florence M. Kizza.
author_display Kizza, Joseph Migga
availability_toggle_arlington Available Now, Available Online, Entire Collection
callnumber-a HV6773
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
days_since_added 3189
detailed_location_arlington EBSCOhost
display_description "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher.
econtent_protection_type_arlington external
econtent_source_arlington EBSCOhost
format_arlington eBook
format_boost 10
format_category_arlington eBook
grouping_category book
id d6f9b9c3-ce54-b834-2dea-f0e6918563d3
isbn 9781599043791, 9781599043814
item_details external_econtent:ils:.b12947398||EBSCOhost|Online|eBook|eBook|1|false|true|EBSCOhost||http://www.netlibrary.com.library.access.arlingtonva.us/urlapi.asp?action=summary&v=1&bookid=203785||Available Online||q||
itype_arlington eCollection
language English
language_boost 10
language_boost_es 1
lexile_score -1
lib_boost_arlington 50
literary_form Other
literary_form_full Other
local_callnumber_arlington Online
local_callnumber_exact_arlington Online
local_callnumber_left_arlington Online
local_days_since_added_arlington 3189
num_holdings 0
oclc (OCoLC)175289238
owning_library_arlington Arlington Public Library Online, Aurora Hills Online, Central Online, Cherrydale Online, Columbia Pike Online, Connection Crystal City Online, Detention Center Online, Glencarlyn Online, Local History Online, Plaza Online, Shirlington Online, Westover Online
physical Available also in a print ed., xiv, 368 p. : ill. ; 26 cm.
popularity 0
primary_isbn 9781599043791
publishDate 2008
publishDateSort 2008
publisher Cybertech Pub.,
rating 2.5
rating_facet oneStar, twoStar
record_details external_econtent:ils:.b12947398|eBook|eBook||English|Cybertech Pub.,|c2008.|xiv, 368 p. : ill. ; 26 cm.
recordtype grouped_work
scope_has_related_records a, arlington, c, d, g, h, o, p, s, u, v, w
scoping_details_arlington external_econtent:ils:.b12947398||Available Online|Available Online|false|true|false|false|false|true||||
target_audience Other
target_audience_full Other
title Securing the information infrastructure
title_display Securing the information infrastructure
title_full Securing the information infrastructure [electronic resource] / Joseph M. Kizza, Florence M. Kizza
title_short Securing the information infrastructure
title_sort securing the information infrastructure