36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

The purpose of this Book is to explain the ways and means to protect computers from unauthorized access and tampering with them. Also it explains how to protect data and databases from hackers, as well as protect the computer network-especially private networks- from hacker attacks by activating and investing network protection protocols. This book has the lectures of forth stage in computer technical engineering.

Produktbeschreibung
The purpose of this Book is to explain the ways and means to protect computers from unauthorized access and tampering with them. Also it explains how to protect data and databases from hackers, as well as protect the computer network-especially private networks- from hacker attacks by activating and investing network protection protocols. This book has the lectures of forth stage in computer technical engineering.
Autorenporträt
Ali Jawad Ibada Kannas, born in Iraq 1989, B.ScComputer Engineering Techniques from IslamicUniversity in 2011, 1st rank. M.Sc ComputerEngineering Techniques from Middle TechnicalUniversity in 2015, 1st rank. I had published Fivepapers in different fields. I currently workas a lecturer in Islamic University.