Engineering information security : the application of systems engineering concepts to achieve information assurance /
"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle...
Κύριος συγγραφέας: | |
---|---|
Μορφή: | Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Hoboken, N.J. :
Wiley :
[2011]
IEEE Press, [2011] |
Σειρά: | IEEE Press series on information & communication networks security.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
LEADER | 04829nam a2200877 4500 | ||
---|---|---|---|
001 | ocn747427270 | ||
003 | OCoLC | ||
005 | 20170815040706.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110822s2011 njua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d E7B |d YDXCP |d COO |d OCLCQ |d UIU |d DG1 |d EBLCP |d OCLCQ |d IEEEE |d REDDC |d OCLCQ |d ZMC |d ALAUL |d OCLCQ |d DEBSZ |d OCLCQ |d AFU |d OCLCQ |d OCLCO |d OCLCF |d OCLCO |d MHW |d UKDOC |d OCLCO |d OCLCQ |d OCLCO |d DG1 |d OCLCO |d DG1 |d OCLCO |d N$T |d OCLCQ |d OCLCO |d DG1 |d CPO |d LIP |d OCLCO |d GrThAP | ||
019 | |a 742515616 |a 743201968 |a 750150921 |a 761321448 |a 770867261 |a 791302719 |a 796759303 |a 990661974 | ||
020 | |a 9780470947913 |q (electronic bk.) | ||
020 | |a 0470947918 |q (electronic bk.) | ||
020 | |a 9780470947838 |q (electronic bk.) | ||
020 | |a 0470947837 |q (electronic bk.) | ||
020 | |a 9781118009017 |q (electronic bk.) | ||
020 | |a 1118009010 |q (electronic bk.) | ||
020 | |z 9780470565124 | ||
020 | |z 0470565128 | ||
024 | 8 | |a 9786613138781 | |
024 | 7 | |a 10.1002/9781119104728 |2 doi | |
029 | 1 | |a AU@ |b 000049115599 | |
029 | 1 | |a CHNEW |b 000605849 | |
029 | 1 | |a DEBSZ |b 372695922 | |
029 | 1 | |a DEBSZ |b 377432229 | |
029 | 1 | |a DEBSZ |b 399507035 | |
029 | 1 | |a DEBSZ |b 430992440 | |
029 | 1 | |a NLGGC |b 337101515 | |
029 | 1 | |a NZ1 |b 13934331 | |
029 | 1 | |a SE4M6 |b 120056941 | |
029 | 1 | |a DEBBG |b BV043393462 | |
029 | 1 | |a CHVBK |b 480184879 | |
029 | 1 | |a CHNEW |b 000938180 | |
035 | |a (OCoLC)747427270 |z (OCoLC)742515616 |z (OCoLC)743201968 |z (OCoLC)750150921 |z (OCoLC)761321448 |z (OCoLC)770867261 |z (OCoLC)791302719 |z (OCoLC)796759303 |z (OCoLC)990661974 | ||
037 | |a 313878 |b MIL | ||
050 | 4 | |a QA76.9.A25 |b J325 2011eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a BCCP | ||
100 | 1 | |a Jacobs, Stuart. | |
245 | 1 | 0 | |a Engineering information security : |b the application of systems engineering concepts to achieve information assurance / |c Stuart Jacobs. |
264 | 1 | |a Hoboken, N.J. : |b Wiley : |c [2011] | |
264 | 1 | |b IEEE Press, |c [2011] | |
264 | 4 | |c ©2011 | |
300 | |a 1 online resource (xxv, 700 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a IEEE Press series on information & communication networks security | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t What is Security? -- |t Systems Engineering -- |t Foundation Concepts -- |t Authentication of Subjects -- |t Security Systems Engineering -- |t Traditional Network Concepts -- |t Next-Generation Networks -- |t General Computer Security Architecture -- |t Computer Software Security -- |t Security Systems Design-Designing Network Security -- |t Transport and Application Security Design and Use -- |t Securing Management and Managing Security. |
520 | |a "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Data protection. | |
650 | 4 | |a Computer networks |x Security measures. | |
650 | 4 | |a Computer security. | |
650 | 4 | |a Data protection. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958 | |
650 | 7 | |a Information technology |x Security measures. |2 fast |0 (OCoLC)fst00973129 | |
655 | 4 | |a Electronic books. | |
776 | 0 | 8 | |i Print version: |a Jacobs, Stuart. |t Engineering information security. |d Hoboken, N.J. : Wiley : IEEE Press, ©2011 |z 9780470565124 |w (DLC) 2010028408 |w (OCoLC)500823574 |
830 | 0 | |a IEEE Press series on information & communication networks security. | |
856 | 4 | 0 | |u https://doi.org/10.1002/9780470947913 |z Full Text via HEAL-Link |
994 | |a 92 |b DG1 |