Engineering information security : (Record no. 59795)

000 -LEADER
fixed length control field 04948nam a2201213 i 4500
001 - CONTROL NUMBER
control field 6047604
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421114237.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151221s2011 njua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780470947913
-- ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Jacobs, Stuart,
245 10 - TITLE STATEMENT
Title Engineering information security :
Sub Title the application of systems engineering concepts to achieve information assurance /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (xxv, 700 pages) :
490 1# - SERIES STATEMENT
Series statement IEEE press series on information and communication networks security ;
500 ## - GENERAL NOTE
Remark 1 Some online versions lack accompanying media packaged with the printed version.
500 ## - GENERAL NOTE
Remark 1 Includes index.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 What is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security.
520 ## - SUMMARY, ETC.
Summary, etc "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- Wiley,
-- c2011.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2011]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 12/21/2015.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information technology
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
695 ## -
-- Access control
695 ## -
-- Artificial neural networks
695 ## -
-- Atomic measurements
695 ## -
-- Authentication
695 ## -
-- Availability
695 ## -
-- Biographies
695 ## -
-- Buildings
695 ## -
-- Business
695 ## -
-- Central Processing Unit
695 ## -
-- Complexity theory
695 ## -
-- Computational modeling
695 ## -
-- Computer architecture
695 ## -
-- Computer security
695 ## -
-- Computers
695 ## -
-- Context
695 ## -
-- Cryptography
695 ## -
-- Data models
695 ## -
-- Encryption
695 ## -
-- Hardware
695 ## -
-- Humans
695 ## -
-- IEC standards
695 ## -
-- IP networks
695 ## -
-- ISO standards
695 ## -
-- Indexes
695 ## -
-- Information security
695 ## -
-- Internet
695 ## -
-- Iron
695 ## -
-- Linux
695 ## -
-- Media
695 ## -
-- Monitoring
695 ## -
-- Network topology
695 ## -
-- Next generation networking
695 ## -
-- Open systems
695 ## -
-- Operating systems
695 ## -
-- Organizations
695 ## -
-- Permission
695 ## -
-- Personnel
695 ## -
-- Physical layer
695 ## -
-- Process control
695 ## -
-- Protocols
695 ## -
-- Registers
695 ## -
-- Schedules
695 ## -
-- Security
695 ## -
-- Servers
695 ## -
-- Sockets
695 ## -
-- Software
695 ## -
-- Standards organizations
695 ## -
-- Telecommunications
695 ## -
-- Topology
695 ## -
-- Vectors
695 ## -
-- Virtual private networks
695 ## -
-- Workstations
695 ## -
-- XML

No items available.