Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Showing 1 featured edition. View all 1 editions?
Edition | Availability |
---|---|
1 |
aaaa
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Security from the ground up
Controlling a computer
Controlling files
Sharing files
Storing files
Authenticating people
Encrypting files
Secret and public keys
Encrypting volumes
Connecting computers
Networks of networks
End-to-end networking
Enterprise computing
Network encryption
Internet services and email
The world wide web
Governments and secrecy.
Edition Notes
Includes bibliographical references and index.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created February 29, 2012
- 9 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
September 8, 2023 | Edited by OL-00 | Edited without comment. |
March 20, 2023 | Edited by ImportBot | import existing book |
December 21, 2022 | Edited by MARC Bot | import existing book |
November 2, 2021 | Edited by ImportBot | import existing book |
February 29, 2012 | Created by LC Bot | Imported from Library of Congress MARC record |