Normal view MARC view ISBD view

Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

By: Jacobs, Stuart [author.].
Contributor(s): IEEE Xplore (Online Service) [distributor.] | Wiley InterScience (Online service) [publisher.].
Material type: materialTypeLabelBookSeries: IEEE press series on information and communication networks security: 13Publisher: Hoboken, New Jersey : Wiley, c2011Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2011]Description: 1 PDF (xxv, 700 pages) : illustrations.Content type: text Media type: electronic Carrier type: online resourceISBN: 9780470947913.Subject(s): Data protection | Information technology -- Security measures | Computer networks -- Security measures | Computer security | Access control | Artificial neural networks | Atomic measurements | Authentication | Availability | Biographies | Buildings | Business | Central Processing Unit | Complexity theory | Computational modeling | Computer architecture | Computer security | Computers | Context | Cryptography | Data models | Encryption | Hardware | Humans | IEC standards | IP networks | ISO standards | Indexes | Information security | Internet | Iron | Linux | Media | Monitoring | Network topology | Next generation networking | Open systems | Operating systems | Organizations | Permission | Personnel | Physical layer | Process control | Protocols | Registers | Schedules | Security | Servers | Sockets | Software | Standards organizations | Telecommunications | Topology | Vectors | Virtual private networks | Workstations | XMLGenre/Form: Electronic books.Additional physical formats: Print version:: No titleDDC classification: 005.8 Online resources: Abstract with links to resource Also available in print.
Contents:
What is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security.
Summary: "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher.
    average rating: 0.0 (0 votes)
No physical items for this record

Some online versions lack accompanying media packaged with the printed version.

Includes index.

What is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security.

Restricted to subscribers or individual electronic text purchasers.

"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher.

Also available in print.

Mode of access: World Wide Web

Description based on PDF viewed 12/21/2015.

There are no comments for this item.

Log in to your account to post a comment.