Reference Hub4
Indices3
Securing the Information Infrastructure

Securing the Information Infrastructure

Copyright: © 2008 |Pages: 386
ISBN13: 9781599043791|ISBN10: 1599043793|EISBN13: 9781599043814|ISBN13 Softcover: 9781616927264
DOI: 10.4018/978-1-59904-379-1
Cite Book Cite Book

MLA

Kizza, Joseph, and Florence Migga Kizza. Securing the Information Infrastructure. IGI Global, 2008. https://doi.org/10.4018/978-1-59904-379-1

APA

Kizza, J. & Migga Kizza, F. (2008). Securing the Information Infrastructure. IGI Global. https://doi.org/10.4018/978-1-59904-379-1

Chicago

Kizza, Joseph, and Florence Migga Kizza. Securing the Information Infrastructure. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-379-1

Export Reference

Mendeley
Favorite Full-Book Download

As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However, in this steadily evolving environment, the privacy, security, reliability, and integrity of online content is tested continuously.

Securing the Information Infrastructure provides a framework for building trust in computer technology by exploring an array of safeguards that can be used to uphold the integrity and reliability of computing systems. This book challenges readers to examine rapid advances in information technology to recognize its misuse in society, covering such pressing topics as computer ethics, computer network security, and computer forensics.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Security Through Moral and Ethical Education
This content has been removed at the discretion of the publisher and the editors.
Security Through Innovative Hardware and Software Design
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Security through the Legal System
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
What Next?  (pages 335-335)
What Next?
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Glossary of Terms
This content has been removed at the discretion of the publisher and the editors.
About the Authors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.