Excerpt from Computer Security: Selected Articles
It took days of intensive work (8000 personnel hours. By one estimate) to isolate the worm and clear it from the Internet. No data was destroyed, but realistic estimates of time lost on the affected machines range as high as $10 million.
And, astonishingly, more than a year later some of the bugs that Morris'
About the Publisher
Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com
This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.
"Sinopsis" puede pertenecer a otra edición de este libro.
EUR 0,69 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: LW-9780366866212
Cantidad disponible: 15 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: LW-9780366866212
Cantidad disponible: 15 disponibles
Librería: Forgotten Books, London, Reino Unido
Paperback. Condición: New. Print on Demand. This book presents a comprehensive collection of articles that cover a wide range of computer security topics. The author delves into important aspects such as data security, network protection, ethics, and risk assessment, providing valuable insights into the evolution of computer security as a field. By tracing the historical development of key security concepts, the author analyzes their significance and relevance in today's digital landscape. Through examining real-world security breaches and exploring emerging threats, this book offers a nuanced understanding of the challenges faced by organizations and individuals in safeguarding their digital assets. Ultimately, the book emphasizes the crucial role of proactive measures, risk management, and user education in maintaining a secure computing environment. This book is a reproduction of an important historical work, digitally reconstructed using state-of-the-art technology to preserve the original format. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in the book. print-on-demand item. Nº de ref. del artículo: 9780366866212_0
Cantidad disponible: Más de 20 disponibles