Security in Computing, 5th Edition

Prentice Hall
Learn best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more in this updated version of the classic guide to computer security attacks and countermeasures. Learn more.
To read this article in full or to leave a comment, please click here
Read more: Security in Computing, 5th Edition
Story added 30. January 2015, content source with full text you can find at link above.