Week 06 - Lab 1 ( APUE )___Muhammad
.docx
keyboard_arrow_up
School
University of Texas, Dallas *
*We aren’t endorsed by this school
Course
3377
Subject
Computer Science
Date
May 8, 2024
Type
docx
Pages
39
Uploaded by CoachSparrowMaster99 on coursehero.com
Week 06 - Lab 1 ( APUE )
Muhammad
login as: axm210331
Pre-authentication banner message from server:
| University of Texas at Dallas
| Department of Computer Science
|
| Use of UTD Information Systems is subject to
| the UTD Information Security and Acceptable Use Policy.
|
| Pursuant to Texas Administrative Code 202:
| (1) Unauthorized use is prohibited;
| (2) Usage may be subject to security testing and monitoring;
| (3) Misuse is subject to criminal prosecution; and
| (4) No expectation of privacy except as otherwise provided by applicable
| privacy laws.
|
| ATTENTION: utdnetid != utdnetid@utdallas.edu (UTD != Google!)
|
| Just use utdnetid, and for the love of programming, STOP USING ALL CAPS!
|
| [[NOTE: All CS Graduate Students should use csgrads1.utdallas.edu ]]
| [[ If you are a CS Graduate Student, you cannot logon to this server.]]
|
|
| ***** This system will require a connection to the GlobalProtect VPN startin
> g
| on the following dates:
|
| cslinux1.utdallas.edu - June 15, 2020
| cslinux2.utdallas.edu - June 22, 2020
|
| ***** GlobalProtect VPN Instructions: https://www.utdallas.edu/oit/howto/vpn
> /
|
End of banner message from server
Keyboard-interactive authentication prompts from server:
End of keyboard-interactive prompts from server
+----------------------------------------------------------------------+
MobaXterm Personal Edition v23.2 (SSH client, X server and network tools) ? SSH session to axm210331@cslinux1.utdallas.edu Direct SSH : ? SSH compression : ? SSH-browser : ? X11-forwarding : ? (remote display is forwarded through SSH) ? For more info, ctrl+click on help or visit our website. +----------------------------------------------------------------------+
Last login: Sat Sep 30 00:42:58 2023 from 10.50.124.129
***---***---***---***---***---***
csgrads1.utdallas.edu - CentOS Linux 7.9
--All CS Graduate Students should use csgrads1--
cs1.utdallas.edu - CentOS Linux 7.9
cs2.utdallas.edu - CentOS Linux 7.9
***---***---***---***---***---***
This system is for use by CS students who need a general purpose Linux system
to complete homework assignments. Computationally or resource intensive
simulations will be throttled automatically.
Thank you,
CS Lab Manager
cs-labs@utdallas.edu
/scratch disk space can be used for temporary files.
All files within /scratch will be erased on a regular basis (Sunday 0300).
{cslinux1:~} script apue
script: cannot open apue: Is a directory
Terminated
{cslinux1:~} script week5lab1
Script started, file is week5lab1
{cslinux1:~} cd apue
{cslinux1:~/apue} gunzip src.3e.tar.gz
{cslinux1:~/apue} tar -xvf src.3e.tar
apue.3e/
apue.3e/advio/
apue.3e/daemons/
apue.3e/datafiles/
apue.3e/db/
apue.3e/DISCLAIMER
apue.3e/environ/
apue.3e/exercises/
apue.3e/figlinks/
apue.3e/filedir/
apue.3e/fileio/
apue.3e/include/
apue.3e/intro/
apue.3e/ipc1/
apue.3e/ipc2/
apue.3e/lib/
apue.3e/Make.defines.freebsd
apue.3e/Make.defines.linux
apue.3e/Make.defines.macos
apue.3e/Make.defines.solaris
apue.3e/Make.libapue.inc
apue.3e/Makefile
apue.3e/printer/
apue.3e/proc/
apue.3e/pty/
apue.3e/README
apue.3e/relation/
apue.3e/signals/
apue.3e/sockets/
apue.3e/standards/
apue.3e/stdio/
apue.3e/systype.sh
apue.3e/termios/
apue.3e/threadctl/
apue.3e/threads/
apue.3e/threads/badexit2.c
apue.3e/threads/barrier.c
apue.3e/threads/cleanup.c
apue.3e/threads/condvar.c
apue.3e/threads/exitstatus.c
apue.3e/threads/Makefile
apue.3e/threads/maketimeout.c
apue.3e/threads/mutex1.c
apue.3e/threads/mutex2.c
apue.3e/threads/mutex3.c
apue.3e/threads/rwlock.c
apue.3e/threads/threadid.c
apue.3e/threads/timedlock.c
apue.3e/threadctl/atfork.c
apue.3e/threadctl/detach.c
apue.3e/threadctl/getenv1.c
apue.3e/threadctl/getenv2.c
apue.3e/threadctl/getenv3.c
apue.3e/threadctl/Makefile
apue.3e/threadctl/suspend.c
apue.3e/threadctl/timeout.c
apue.3e/termios/csize.c
apue.3e/termios/ctermid.c
apue.3e/termios/getpass.c
apue.3e/termios/isatty.c
apue.3e/termios/Makefile
apue.3e/termios/settty.c
apue.3e/termios/t_getpass.c
apue.3e/termios/t_isatty.c
apue.3e/termios/t_raw.c
apue.3e/termios/t_ttyname.c
apue.3e/termios/ttyname.c
apue.3e/termios/winch.c
apue.3e/stdio/buf.c
apue.3e/stdio/fgetsfputs.c
apue.3e/stdio/getcharbug.c
apue.3e/stdio/getcputc.c
apue.3e/stdio/Makefile
apue.3e/stdio/memstr.c
apue.3e/stdio/mkstemp.c
apue.3e/stdio/tempfiles.c
apue.3e/standards/conf.c.modified
apue.3e/standards/makeconf.awk
apue.3e/standards/Makefile
apue.3e/standards/makeopt.awk
apue.3e/standards/pathconf-lim.sym
apue.3e/standards/pathconf-opt.sym
apue.3e/standards/sysconf-lim.sym
apue.3e/standards/sysconf-opt.sym
apue.3e/sockets/clconn.c
apue.3e/sockets/clconn2.c
apue.3e/sockets/findsvc.c
apue.3e/sockets/initsrv1.c
apue.3e/sockets/initsrv2.c
apue.3e/sockets/makefile
apue.3e/sockets/ruptime-dg.c
apue.3e/sockets/ruptime.c
apue.3e/sockets/ruptimed-dg.c
apue.3e/sockets/ruptimed-fd.c
apue.3e/sockets/ruptimed.c
apue.3e/signals/abort.c
apue.3e/signals/child.c
apue.3e/signals/critical.c
apue.3e/signals/Makefile
apue.3e/signals/mask.c
apue.3e/signals/read1.c
apue.3e/signals/read2.c
apue.3e/signals/reenter.c
apue.3e/signals/setops.c
apue.3e/signals/sigtstp.c
apue.3e/signals/sigusr.c
apue.3e/signals/sleep1.c
apue.3e/signals/sleep2.c
apue.3e/signals/suspend1.c
apue.3e/signals/suspend2.c
apue.3e/signals/system.c
apue.3e/signals/systest2.c
apue.3e/signals/tsleep2.c
apue.3e/relation/Makefile
apue.3e/relation/orphan3.c
apue.3e/pty/driver.c
apue.3e/pty/loop.c
apue.3e/pty/main.c
apue.3e/pty/Makefile
apue.3e/proc/awkexample
apue.3e/proc/echoall.c
apue.3e/proc/exec1.c
apue.3e/proc/exec2.c
apue.3e/proc/fork1.c
apue.3e/proc/fork2.c
apue.3e/proc/Makefile
apue.3e/proc/nice.c
apue.3e/proc/pracct.c
apue.3e/proc/pruids.c
apue.3e/proc/system.c
apue.3e/proc/systest1.c
apue.3e/proc/systest3.c
apue.3e/proc/tellwait1.c
apue.3e/proc/tellwait2.c
apue.3e/proc/test1.c
apue.3e/proc/times1.c
apue.3e/proc/vfork1.c
apue.3e/proc/wait1.c
apue.3e/printer/ipp.h
apue.3e/printer/Makefile
apue.3e/printer/print.c
apue.3e/printer/print.h
apue.3e/printer/printd.c
apue.3e/printer/util.c
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
True or False: HIPAA does not provide for specific circumstances in which law enforcement officers can access PHI
arrow_forward
Describe the security techniques used for the following
situations and justify their uses:
a) Separating files of one user from another
b) Making data secure and hard to read by unauthorised users
c) Detecting malicious files received from the Internet
d) Blocking unwanted traffic trying to access a network
criteria
List the names, purposes and characteristics of a range of security techniques.
Justify the use of a range of security techniques in typical situations.
note
just listing isn’t enough. We need to know the purpose and technical details of each security technique
no handwriting please
arrow_forward
a) Alice is an employee at the Xiamen University of Technology (XUT). Recently, Alice's
computer had some issues, and the IT department of XUT provided Alice with a
temporary computer. While using this temporary computer, Alice notices (from the
browser history, downloaded files) that the temporary computer was previously used by
some other employees of XUT, and contains sensitive information such as several user's
ID and passwords (stored in the browser), PowerPoint slides containing confidential
employee information etc.
To address the security issues discussed in this scenario, answer the below questions:
i) Describe a control measure based on policy and procedures, and a control measure
based on education, training and awareness.
i1)
Compare the control measures described above. Which of these do you think will
be the most effective in this scenario? Justify your answer.
arrow_forward
1-page PHI/EPHI Policy (Note: In Week Five, you will practice writing policies again.)
PHI/EPHI Policy Template
Version:
<Indicate the version of the policy, its revision date, and the approver.>
Purpose:
This policy prohibits the use, storage, and discloser of Personal Health Information (PHI) and Electronic Personal Heal information (EPHI), except as specifically permitted or required by HIPAA regulation.
Scope:
<Describe who this applies to in the organization.>
Policy:
1. <Provide accurate definitions used in the policy, like PHI.>
2. <State how data must be stored (e.g., encrypted).>
3. <Indicate covered entities.>
4. <Indicate the consequences for a confidentiality breach.>
5. <Indicate what standards the policy follows (e.g., NIST SP800-53).>
arrow_forward
1)Discusss the security aspects of gmail system
arrow_forward
Question 8
The two types of incidents (external and internal) always share the same motivation for the attack.
O True
O False
Question 9
What is the purpose of the following Google Dork?
filetype:txt "passwords" site:abc.de.fg
O It will search for the abc.de.fg .txt file
O It will search for the txt file that contains the 'passwords' string in the abc.de.fg website
O It will search for the .txt file (excluding the 'passwords' string) in the abc.de.fg website
arrow_forward
You've been warned about a ransomware assault known as Ryuk. Assume that each infected device will cost you $100 to restore your files.
Write a one-page executive briefing (in memo style) outlining the following actions to address the danger you've identified:
Find out about a security danger and/or breach and study the information you findAssess the danger and prepare a briefing for senior management (a one-page paper in Word, PDF, etc.)Write a concise summary of the main aspects of the problemWhat effect, if any, could it have on St. Eligius?Make suggestions for short-term measures to reduce the risk.Suggestions for long-term mitigation
arrow_forward
Q3) Now a day, nearly every library, airport and hotel offer a way to access the
Internet from your cell phone or other mobile device. That means the information
you have on your phone could be available to hackers in the area – unless you've
taken steps to protect your data. As a computer engineering, how can you protects
your phone data from hackers? Discuss this issue briefly.
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
According to the courts, what does the First Amendment of the U.S. Constitution allow
for internet free "speech?" May the Government browse Web sites without a warrant in
order to nip terrorism plots in the bud? What does the Fourth Amendment's search and
seizure provisions allow with regard to shutting down objectionable web sites? What about
sites that are hosted overseas?
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
Inquiry into the means by which individuals can ensure the preservation of their anonymity on the Internet?
arrow_forward
Distinguish between spoofing and session hijacking. Assuming you're a web user, write down any two precautions you take to avoid session hijacking.
arrow_forward
Explain the concept of end-to-end encryption in messaging applications and its implications for privacy and security.
arrow_forward
Q) Write a detailed explanation on how cookies work in web
technologies. In your explanation, please address the following points:
Definition: Define what cookies are in the context of web technologies.
Creation and Storage: Explain how cookies are created and where they
are stored.
Usage: Discuss how cookies are used by websites for session
management, personalization, and tracking user behavior.
Security Concerns: Discuss any security concerns associated with the use
of cookies and how they can be mitigated.
Alternatives: Are there any alternatives to cookies in modern web
development? If so, discuss them.
arrow_forward
Authentication in today's internet world seems like a daunting
endeavor; please explain the reasons why this is the case.
arrow_forward
legal aspect of cybersecurity
ScarJo Services, Inc. is a New York company allowing customers from around theworld to set up sight-seeing tours of cities where Scarlet Johansson has filmedmemorable scenes in film. One day, ScarJo gets an email from “Liev Kieturakis,” whoclaims to have used ScarJo’s services last year and wants all of his information deletedfrom ScarJo’s databases pursuant to GDPR. Which of the following should be ScarJo’sfirst response to Liev?A. Confirm receipt of request.B. Seek authentication that Liev is a ScarJo customer.C. Erase all information related to Liev within 30 days.D. Deny Liev’s request.
arrow_forward
Explain the concept of end-to-end encryption in Internet communication. How does it enhance privacy and security for users?
arrow_forward
Task: Research Network Security Attacks
Each student will search using Internet resources including Cisco NetAcad for the following
information about the network security attacks as given in the table below.
You should add figures to support your explanation.
Answer each of the following questions for the type of security attack provided in the table
below:
1. What is that type of attack?
2. Discuss different types of that attack, if any.
3. How each type of that attack effects the network and users?
4. Give at least five security recommendations to control and prevent that attack.
(Malware (Virus, Worm, Trojans))
arrow_forward
Discuss the principles of end-to-end encryption and its role in securing data transmission over the Internet.
arrow_forward
What are the security techniques/mechanisms that might be utilized to safeguard vehicular communications or vehicle-to-vehicle communications? * The second issue is how long each security approach or mechanism takes to encrypt and decrypt a communication.
arrow_forward
Which of the following is true about the hack against the credit reporting company Equifax? (Choose 2)
O The attack was considered an act of cyberwarfare.
Hackers were targeting personal information such as credit card numbers.
The attack affected US citizens as well as Canadians and Britons.
The attack was motivated by hackers taking revenge on the credit agency.
The attack was the work of insider hackers.
arrow_forward
dont post copied one multiple dislikes strict warning dont answer if dont know posting multiple times
arrow_forward
Please explain full to better understand. Write answer in atleast 5-6 pages.
Write answer according to given question. I need more and proper explaination.
Please don't copy and paste from other website.
Subject:- Cyber Security
arrow_forward
CASE STUDY 1: AW GUIDE
John Morris recently became a marketing manager of AW Guide, a tour guide
company. Nine months earlier, the company had established a new service: sending a
newsletter through emails to customers notifying them of tour updates and inviting
them to download the latest tours and travel information. The same information is made
available on their corporate website. Customers initially expressed delight with the
service. But in the past month, many customers have complained that the travel
information they received in the emails was out of date. Since then, the company has
received many cancellation requests and had affected the company sales performance.
John realizes that something is wrong with the content-updating and distribution
process he uses for emails and website. But he is unsure how to address the problem.
The lack of use of IT applications in current business processes has also contributed to
a loss of efficiency and customer focus. John has proposed to…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Related Questions
- True or False: HIPAA does not provide for specific circumstances in which law enforcement officers can access PHIarrow_forwardDescribe the security techniques used for the following situations and justify their uses: a) Separating files of one user from another b) Making data secure and hard to read by unauthorised users c) Detecting malicious files received from the Internet d) Blocking unwanted traffic trying to access a network criteria List the names, purposes and characteristics of a range of security techniques. Justify the use of a range of security techniques in typical situations. note just listing isn’t enough. We need to know the purpose and technical details of each security technique no handwriting pleasearrow_forwarda) Alice is an employee at the Xiamen University of Technology (XUT). Recently, Alice's computer had some issues, and the IT department of XUT provided Alice with a temporary computer. While using this temporary computer, Alice notices (from the browser history, downloaded files) that the temporary computer was previously used by some other employees of XUT, and contains sensitive information such as several user's ID and passwords (stored in the browser), PowerPoint slides containing confidential employee information etc. To address the security issues discussed in this scenario, answer the below questions: i) Describe a control measure based on policy and procedures, and a control measure based on education, training and awareness. i1) Compare the control measures described above. Which of these do you think will be the most effective in this scenario? Justify your answer.arrow_forward
- 1-page PHI/EPHI Policy (Note: In Week Five, you will practice writing policies again.) PHI/EPHI Policy Template Version: <Indicate the version of the policy, its revision date, and the approver.> Purpose: This policy prohibits the use, storage, and discloser of Personal Health Information (PHI) and Electronic Personal Heal information (EPHI), except as specifically permitted or required by HIPAA regulation. Scope: <Describe who this applies to in the organization.> Policy: 1. <Provide accurate definitions used in the policy, like PHI.> 2. <State how data must be stored (e.g., encrypted).> 3. <Indicate covered entities.> 4. <Indicate the consequences for a confidentiality breach.> 5. <Indicate what standards the policy follows (e.g., NIST SP800-53).>arrow_forward1)Discusss the security aspects of gmail systemarrow_forwardQuestion 8 The two types of incidents (external and internal) always share the same motivation for the attack. O True O False Question 9 What is the purpose of the following Google Dork? filetype:txt "passwords" site:abc.de.fg O It will search for the abc.de.fg .txt file O It will search for the txt file that contains the 'passwords' string in the abc.de.fg website O It will search for the .txt file (excluding the 'passwords' string) in the abc.de.fg websitearrow_forward
- You've been warned about a ransomware assault known as Ryuk. Assume that each infected device will cost you $100 to restore your files. Write a one-page executive briefing (in memo style) outlining the following actions to address the danger you've identified: Find out about a security danger and/or breach and study the information you findAssess the danger and prepare a briefing for senior management (a one-page paper in Word, PDF, etc.)Write a concise summary of the main aspects of the problemWhat effect, if any, could it have on St. Eligius?Make suggestions for short-term measures to reduce the risk.Suggestions for long-term mitigationarrow_forwardQ3) Now a day, nearly every library, airport and hotel offer a way to access the Internet from your cell phone or other mobile device. That means the information you have on your phone could be available to hackers in the area – unless you've taken steps to protect your data. As a computer engineering, how can you protects your phone data from hackers? Discuss this issue briefly.arrow_forwardYou are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain. After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…arrow_forward
- According to the courts, what does the First Amendment of the U.S. Constitution allow for internet free "speech?" May the Government browse Web sites without a warrant in order to nip terrorism plots in the bud? What does the Fourth Amendment's search and seizure provisions allow with regard to shutting down objectionable web sites? What about sites that are hosted overseas?arrow_forwardYou are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain. After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…arrow_forwardYou are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain. After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,