000 | 04948nam a2201213 i 4500 | ||
---|---|---|---|
001 | 6047604 | ||
003 | IEEE | ||
005 | 20200421114237.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 151221s2011 njua ob 001 eng d | ||
020 |
_a9780470947913 _qebook |
||
020 |
_z9780470565124 _qprint |
||
020 |
_z0470947918 _qelectronic |
||
020 |
_z0470947837 _qelectronic |
||
020 |
_z9780470947838 _qelectronic |
||
024 | 8 | _a9786613138781 | |
035 | _a(CaBNVSL)mat06047604 | ||
035 | _a(IDAMS)0b00006481692aa6 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aQA76.9.A25 _bJ325 2011eb |
|
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 |
_aJacobs, Stuart, _eauthor. |
|
245 | 1 | 0 |
_aEngineering information security : _bthe application of systems engineering concepts to achieve information assurance / _cStuart Jacobs. |
264 | 1 |
_aHoboken, New Jersey : _bWiley, _cc2011. |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c[2011] |
|
300 |
_a1 PDF (xxv, 700 pages) : _billustrations. |
||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aIEEE press series on information and communication networks security ; _v13 |
|
500 | _aSome online versions lack accompanying media packaged with the printed version. | ||
500 | _aIncludes index. | ||
505 | 0 | _aWhat is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security. | |
506 | 1 | _aRestricted to subscribers or individual electronic text purchasers. | |
520 | _a"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher. | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
588 | _aDescription based on PDF viewed 12/21/2015. | ||
650 | 0 | _aData protection. | |
650 | 0 |
_aInformation technology _xSecurity measures. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
655 | 0 | _aElectronic books. | |
695 | _aAccess control | ||
695 | _aArtificial neural networks | ||
695 | _aAtomic measurements | ||
695 | _aAuthentication | ||
695 | _aAvailability | ||
695 | _aBiographies | ||
695 | _aBuildings | ||
695 | _aBusiness | ||
695 | _aCentral Processing Unit | ||
695 | _aComplexity theory | ||
695 | _aComputational modeling | ||
695 | _aComputer architecture | ||
695 | _aComputer security | ||
695 | _aComputers | ||
695 | _aContext | ||
695 | _aCryptography | ||
695 | _aData models | ||
695 | _aEncryption | ||
695 | _aHardware | ||
695 | _aHumans | ||
695 | _aIEC standards | ||
695 | _aIP networks | ||
695 | _aISO standards | ||
695 | _aIndexes | ||
695 | _aInformation security | ||
695 | _aInternet | ||
695 | _aIron | ||
695 | _aLinux | ||
695 | _aMedia | ||
695 | _aMonitoring | ||
695 | _aNetwork topology | ||
695 | _aNext generation networking | ||
695 | _aOpen systems | ||
695 | _aOperating systems | ||
695 | _aOrganizations | ||
695 | _aPermission | ||
695 | _aPersonnel | ||
695 | _aPhysical layer | ||
695 | _aProcess control | ||
695 | _aProtocols | ||
695 | _aRegisters | ||
695 | _aSchedules | ||
695 | _aSecurity | ||
695 | _aServers | ||
695 | _aSockets | ||
695 | _aSoftware | ||
695 | _aStandards organizations | ||
695 | _aTelecommunications | ||
695 | _aTopology | ||
695 | _aVectors | ||
695 | _aVirtual private networks | ||
695 | _aWorkstations | ||
695 | _aXML | ||
710 | 2 |
_aIEEE Xplore (Online Service), _edistributor. |
|
710 | 2 |
_aWiley InterScience (Online service), _epublisher. |
|
776 | 0 | 8 |
_iPrint version: _z9780470565124 |
830 | 0 |
_aIEEE press series on information and communication networks security ; _v13 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttp://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604 |
942 | _cEBK | ||
999 |
_c59795 _d59795 |