Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
Kizza, Joseph M. Social and Ethical Issues in the Information Age. 2nd edition, New York: Springer, 2003.
Scherphier, A. CS596 Client-Server Programming Security. http://www.sdsu.edu/ cs596/security.html.
Mercuri, Rebecca and Peter Neumann. Security by Obsecurity. Communication of the ACM. Vol.46, No.11. Page 160.
McCullagh, Adrian and Willian Caelli Non-repudiation in the Digital Environment. http://www.firstmonday.dk/issues/issue5_8/mccullagh/index.html#author.
Department of Homeland Security. http://www.dohs.gov/.
CobiT a Practical Toolkit for IT Governance. http://www.ncc.co.uk/ncc/myitadviser/archive/issue8/business_processes.cfm.
OCTAVE: Information Security Risk Evaluation. http://www.cert.org/octave/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Kizza, J.M. (2009). Understanding Computer Network Security. In: Kizza, J.M. (eds) A Guide to Computer Network Security. The Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-917-2_2
Download citation
DOI: https://doi.org/10.1007/978-1-84800-917-2_2
Publisher Name: Springer, London
Print ISBN: 978-1-84800-916-5
Online ISBN: 978-1-84800-917-2
eBook Packages: Computer ScienceComputer Science (R0)