Information Security. Mark Stamp
Чтение книги онлайн.
Читать онлайн книгу Information Security - Mark Stamp страница 8
332 345
333 346
334 347
335 348
336 349
337 350
338 351
339 352
340 353
341 354
342 355
343 356
344 357
345 358
346 359
347 360
348 361
349 362
350 363
351 364
352 365
353 366
354 367
355 368
356 369
357 370
358 371
359 372
360 373
361 374
362 375
363 376
364 377
365 378
366 379
367 380
368 381
369 382
370 383
371 384
372 385
373 386
374 387
375 388
376 389
377 390
378 391
379 392
380 393
381 394
382 395
383 396
384 397
385 398
386 399
387 400
388 401
389 402
390 403
391 404
392 405
393 406
394 407
395 408
396 409
397 410
398 411
399 412
400 413
401 414
402 415
403 416
404 417
405 419
406 420
407 421
408 422
409 423
410 424
411 425
412 426
413 427
414 428
415 429
416 430
417 431
Information Security
Principles and Practice
Third Edition
Mark Stamp
San Jose State University San Joe, California
This edition first published 2022
©2022 by John Wiley & Sons, Inc.
Edition History
1e 2006 Wiley; 2e 2011 Wiley
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
The right of Mark Stamp to be identified as the author of this work has been asserted in accordance with law.