Guide to Computer Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2009)


If we are to believe in Moore's law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in ? ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because ? rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.

R2,030

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles20300
Mobicred@R190pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

If we are to believe in Moore's law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in ? ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because ? rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Springer London

Country of origin

United Kingdom

Series

Computer Communications and Networks

Release date

October 2010

Availability

Expected to ship within 10 - 15 working days

First published

2009

Authors

Dimensions

235 x 155 x 25mm (L x W x T)

Format

Paperback

Pages

476

Edition

Softcover reprint of hardcover 1st ed. 2009

ISBN-13

978-1-84996-806-5

Barcode

9781849968065

Categories

LSN

1-84996-806-3



Trending On Loot