menu
{ "item_title" : "Guide to Computer Network Security", "item_author" : [" Joseph Migga Kizza "], "item_description" : "If we are to believe in Moore's law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in ? ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because ? rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/84/996/806/1849968063_b.jpg", "price_data" : { "retail_price" : "69.99", "online_price" : "69.99", "our_price" : "69.99", "club_price" : "69.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Guide to Computer Network Security|Joseph Migga Kizza

Guide to Computer Network Security

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

If we are to believe in Moore's law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in ? ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because ? rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.

This item is Non-Returnable

Details

  • ISBN-13: 9781849968065
  • ISBN-10: 1849968063
  • Publisher: Springer
  • Publish Date: October 2010
  • Dimensions: 9.21 x 6.14 x 1.01 inches
  • Shipping Weight: 1.53 pounds
  • Page Count: 476

Related Categories

You May Also Like...

    1

BAM Customer Reviews