Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This work discusses existing and potential threats to computer systems and networks, and outlines the basic actions that are generally taken to protect them. Topics covered include: security models; authentication issues; access control; intrusion detection and damage control.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.