Engineering information security : (Record no. 59795)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04948nam a2201213 i 4500 |
001 - CONTROL NUMBER | |
control field | 6047604 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421114237.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151221s2011 njua ob 001 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780470947913 |
-- | ebook |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Jacobs, Stuart, |
245 10 - TITLE STATEMENT | |
Title | Engineering information security : |
Sub Title | the application of systems engineering concepts to achieve information assurance / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 PDF (xxv, 700 pages) : |
490 1# - SERIES STATEMENT | |
Series statement | IEEE press series on information and communication networks security ; |
500 ## - GENERAL NOTE | |
Remark 1 | Some online versions lack accompanying media packaged with the printed version. |
500 ## - GENERAL NOTE | |
Remark 1 | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | What is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Hoboken, New Jersey : |
-- | Wiley, |
-- | c2011. |
264 #2 - | |
-- | [Piscataqay, New Jersey] : |
-- | IEEE Xplore, |
-- | [2011] |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | electronic |
-- | isbdmedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 ## - | |
-- | Description based on PDF viewed 12/21/2015. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information technology |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
695 ## - | |
-- | Access control |
695 ## - | |
-- | Artificial neural networks |
695 ## - | |
-- | Atomic measurements |
695 ## - | |
-- | Authentication |
695 ## - | |
-- | Availability |
695 ## - | |
-- | Biographies |
695 ## - | |
-- | Buildings |
695 ## - | |
-- | Business |
695 ## - | |
-- | Central Processing Unit |
695 ## - | |
-- | Complexity theory |
695 ## - | |
-- | Computational modeling |
695 ## - | |
-- | Computer architecture |
695 ## - | |
-- | Computer security |
695 ## - | |
-- | Computers |
695 ## - | |
-- | Context |
695 ## - | |
-- | Cryptography |
695 ## - | |
-- | Data models |
695 ## - | |
-- | Encryption |
695 ## - | |
-- | Hardware |
695 ## - | |
-- | Humans |
695 ## - | |
-- | IEC standards |
695 ## - | |
-- | IP networks |
695 ## - | |
-- | ISO standards |
695 ## - | |
-- | Indexes |
695 ## - | |
-- | Information security |
695 ## - | |
-- | Internet |
695 ## - | |
-- | Iron |
695 ## - | |
-- | Linux |
695 ## - | |
-- | Media |
695 ## - | |
-- | Monitoring |
695 ## - | |
-- | Network topology |
695 ## - | |
-- | Next generation networking |
695 ## - | |
-- | Open systems |
695 ## - | |
-- | Operating systems |
695 ## - | |
-- | Organizations |
695 ## - | |
-- | Permission |
695 ## - | |
-- | Personnel |
695 ## - | |
-- | Physical layer |
695 ## - | |
-- | Process control |
695 ## - | |
-- | Protocols |
695 ## - | |
-- | Registers |
695 ## - | |
-- | Schedules |
695 ## - | |
-- | Security |
695 ## - | |
-- | Servers |
695 ## - | |
-- | Sockets |
695 ## - | |
-- | Software |
695 ## - | |
-- | Standards organizations |
695 ## - | |
-- | Telecommunications |
695 ## - | |
-- | Topology |
695 ## - | |
-- | Vectors |
695 ## - | |
-- | Virtual private networks |
695 ## - | |
-- | Workstations |
695 ## - | |
-- | XML |
No items available.