000 04929nam a2201201 i 4500
001 6047604
003 IEEE
005 20230927112353.0
006 m o d
007 cr |n|||||||||
008 151221s2011 njua ob 001 eng d
020 _a9780470947913
_qebook
020 _z9780470565124
_qprint
020 _z0470947918
_qelectronic
020 _z0470947837
_qelectronic
020 _z9780470947838
_qelectronic
024 8 _a9786613138781
035 _a(CaBNVSL)mat06047604
035 _a(IDAMS)0b00006481692aa6
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
082 0 4 _a005.8
100 1 _aJacobs, Stuart,
_eauthor.
245 1 0 _aEngineering information security :
_bthe application of systems engineering concepts to achieve information assurance /
_cStuart Jacobs.
264 1 _aHoboken, New Jersey :
_bWiley,
_cc2011.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2011]
300 _a1 PDF (xxv, 700 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aIEEE press series on information and communication networks security ;
_v13
500 _aSome online versions lack accompanying media packaged with the printed version.
500 _aIncludes index.
505 0 _aWhat is Security? -- Systems Engineering -- Foundation Concepts -- Authentication of Subjects -- Security Systems Engineering -- Traditional Network Concepts -- Next-Generation Networks -- General Computer Security Architecture -- Computer Software Security -- Security Systems Design-Designing Network Security -- Transport and Application Security Design and Use -- Securing Management and Managing Security.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _a"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/21/2015.
650 0 _aData protection.
650 0 _aInformation technology
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security.
655 0 _aElectronic books.
695 _aAccess control
695 _aArtificial neural networks
695 _aAtomic measurements
695 _aAuthentication
695 _aAvailability
695 _aBiographies
695 _aBuildings
695 _aBusiness
695 _aCentral Processing Unit
695 _aComplexity theory
695 _aComputational modeling
695 _aComputer architecture
695 _aComputer security
695 _aComputers
695 _aContext
695 _aCryptography
695 _aData models
695 _aEncryption
695 _aHardware
695 _aHumans
695 _aIEC standards
695 _aIP networks
695 _aISO standards
695 _aIndexes
695 _aInformation security
695 _aInternet
695 _aIron
695 _aLinux
695 _aMedia
695 _aMonitoring
695 _aNetwork topology
695 _aNext generation networking
695 _aOpen systems
695 _aOperating systems
695 _aOrganizations
695 _aPermission
695 _aPersonnel
695 _aPhysical layer
695 _aProcess control
695 _aProtocols
695 _aRegisters
695 _aSchedules
695 _aSecurity
695 _aServers
695 _aSockets
695 _aSoftware
695 _aStandards organizations
695 _aTelecommunications
695 _aTopology
695 _aVectors
695 _aVirtual private networks
695 _aWorkstations
695 _aXML
710 2 _aIEEE Xplore (Online Service),
_edistributor.
710 2 _aWiley InterScience (Online service),
_epublisher.
776 0 8 _iPrint version:
_z9780470565124
830 0 _aIEEE press series on information and communication networks security ;
_v13
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604
999 _c40464
_d40464