Analysis Techniques for Information Security

Available
0
StarStarStarStarStar
0Reviews
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of service...
Read more
product_type_E-book
pdf
Price
32.00 £
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of service...
Read more
Follow the Author

Options

  • Formats: pdf
  • ISBN: 9781598296303
  • Publication Date: 11 Nov 2010
  • Publisher: Morgan & Claypool Publishers
  • Product language: English
  • Drm Setting: DRM