Information Security Illuminated

A comprehensive survey of the most current and critical information security practices, Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language...

Full description

Saved in:
Bibliographic Details
Main Authors: Solomon, Michael G. 1963- (Author), Chapple, Mike (Author)
Format: Book Chapter
Language:English
Published: Sudbury, MA Jones and Bartlett Publishers 2005
Series:Jones and Barlett illuminated series
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000caa#a2200000#i 4501
001 wils-332431
005 202305115825
008 t2005 MAU a## ##001 ##eng#D
020 # # |a 9780763726775 (paperback) 
020 # # |a 076372677X (paperback) 
040 # # |a DLC  |d ITMB  |e rda 
041 0 # |a eng 
090 0 0 |a QA76.9.A25  |b S657 2005 
100 1 # |a Solomon, Michael G.  |d 1963-  |e author 
245 1 0 |a Information Security Illuminated  |c Michael G. Solomon, Mike Chapple 
264 # 1 |a Sudbury, MA  |b Jones and Bartlett Publishers  |c 2005 
264 # 4 |c ©2005 
300 # # |a xxv, 447 pages  |b illustrations  |c 23 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
490 1 # |a Jones and Barlett illuminated series 
500 # # |a Includes index 
520 # # |a A comprehensive survey of the most current and critical information security practices, Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language and reinforced by a large number of scenario-based exercises and practical review questions. Readers are then able to apply their knowledge through hands-on experience with computer security-related tools. Coverage begins with the basics of computer security (CIA and DAD triads, risk analysis, etc.), and moves quickly through to important, real-world topics such as access control methodologies, security principles and practices, business continuity planning and disaster recovery, firewalls, incident handling, and much more. In addition to providing the requisite material for a complete course in information security practices, the book can be used as a self-study guide for many of the basic security certifications. 
546 # # |a english 
650 # 0 |a Computer security  |x Security measures 
650 # 0 |a Computer networks  |x Security measures 
700 1 # |a Chapple, Mike  |e author 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=332431 
964 # # |c BOK  |d 01 
998 # # |a 00130##a006.2.2||00250##a002.5.2||00250##b002.5.3||00255##a007.25.3||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00502##a007.9.2||00520##a007.2||00520##b007.2||00538##a003.16.9||00546##a006.11||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2||