Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.
Material type: TextSeries: IEEE press series on information and communication networks security ; 13Publisher: Hoboken, New Jersey : Wiley, c2011Distributor: [Piscataqay, New Jersey] : IEEE Xplore, [2011]Description: 1 PDF (xxv, 700 pages) : illustrationsContent type:- text
- electronic
- online resource
- 9780470947913
- Data protection
- Information technology -- Security measures
- Computer networks -- Security measures
- Computer security
- Access control
- Artificial neural networks
- Atomic measurements
- Authentication
- Availability
- Biographies
- Buildings
- Business
- Central Processing Unit
- Complexity theory
- Computational modeling
- Computer architecture
- Computer security
- Computers
- Context
- Cryptography
- Data models
- Encryption
- Hardware
- Humans
- IEC standards
- IP networks
- ISO standards
- Indexes
- Information security
- Internet
- Iron
- Linux
- Media
- Monitoring
- Network topology
- Next generation networking
- Open systems
- Operating systems
- Organizations
- Permission
- Personnel
- Physical layer
- Process control
- Protocols
- Registers
- Schedules
- Security
- Servers
- Sockets
- Software
- Standards organizations
- Telecommunications
- Topology
- Vectors
- Virtual private networks
- Workstations
- XML
- 005.8
Some online versions lack accompanying media packaged with the printed version.
Includes index.
What is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security.
Restricted to subscribers or individual electronic text purchasers.
"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher.
Also available in print.
Mode of access: World Wide Web
Description based on PDF viewed 12/21/2015.
There are no comments on this title.