Information Security Illuminated
A comprehensive survey of the most current and critical information security practices, Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language...
Saved in:
Main Authors: | , |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
Sudbury, MA
Jones and Bartlett Publishers
2005
|
Series: | Jones and Barlett illuminated series
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000caa#a2200000#i 4501 | ||
---|---|---|---|
001 | wils-332431 | ||
005 | 202305115825 | ||
008 | t2005 MAU a## ##001 ##eng#D | ||
020 | # | # | |a 9780763726775 (paperback) |
020 | # | # | |a 076372677X (paperback) |
040 | # | # | |a DLC |d ITMB |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a QA76.9.A25 |b S657 2005 |
100 | 1 | # | |a Solomon, Michael G. |d 1963- |e author |
245 | 1 | 0 | |a Information Security Illuminated |c Michael G. Solomon, Mike Chapple |
264 | # | 1 | |a Sudbury, MA |b Jones and Bartlett Publishers |c 2005 |
264 | # | 4 | |c ©2005 |
300 | # | # | |a xxv, 447 pages |b illustrations |c 23 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
490 | 1 | # | |a Jones and Barlett illuminated series |
500 | # | # | |a Includes index |
520 | # | # | |a A comprehensive survey of the most current and critical information security practices, Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language and reinforced by a large number of scenario-based exercises and practical review questions. Readers are then able to apply their knowledge through hands-on experience with computer security-related tools. Coverage begins with the basics of computer security (CIA and DAD triads, risk analysis, etc.), and moves quickly through to important, real-world topics such as access control methodologies, security principles and practices, business continuity planning and disaster recovery, firewalls, incident handling, and much more. In addition to providing the requisite material for a complete course in information security practices, the book can be used as a self-study guide for many of the basic security certifications. |
546 | # | # | |a english |
650 | # | 0 | |a Computer security |x Security measures |
650 | # | 0 | |a Computer networks |x Security measures |
700 | 1 | # | |a Chapple, Mike |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=332431 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00130##a006.2.2||00250##a002.5.2||00250##b002.5.3||00255##a007.25.3||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00502##a007.9.2||00520##a007.2||00520##b007.2||00538##a003.16.9||00546##a006.11||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2|| |