| 000 | 03050cam a2200481 i 4500 | ||
|---|---|---|---|
| 001 | u11033 | ||
| 003 | SA-PMU | ||
| 005 | 20210418124610.0 | ||
| 008 | 140707t20162012njua b 001 0 eng | ||
| 010 | _a 2014944986 | ||
| 040 |
_aDLC _beng _erda _cDLC _dAU@ _dOCLCO _dNLGGC _dOCLCF _dYDXCP _dOCLCQ _dAUNTL _dMYPER |
||
| 020 |
_a9781285448367 _q(softcover) |
||
| 020 |
_a1285448367 _q(softcover) |
||
| 035 | _a(OCoLC)904377220 | ||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aTK5105.59 _b.W54 2016 |
| 082 | 0 | 0 |
_a005.8 _223 |
| 100 | 1 |
_aWhitman, Michael E., _d1964- |
|
| 245 | 1 | 0 |
_aPrinciples of information security / _cMichael E. Whitman, Herbert J. Mattford. |
| 250 | _aFifth edition. | ||
| 264 | 1 |
_aBoston, MA : _bCengage Learning, _c[2016] |
|
| 264 | 4 | _c©2012 | |
| 300 |
_axxviii, 692 pages : _billustrations ; _c23 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 | _aSpecifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this market-leading introductory book teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program. Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers. | ||
| 505 | 0 | _a1. Introduction to Information Security -- 2. The Need for Security -- 3. Legal, Ethical, and Professional Issues in Information Security -- 4. Planning for Security -- 5. Risk Management -- 6. Security Technology: Firewalls, VPNs, and Wireless -- 7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools -- 8. Cryptography -- 9. Physical Security -- 10. Implementing Information Security -- 11. Security and Personnel -- 12. Information Security Maintenance and eDiscovery | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aComputer security. | |
| 650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
| 650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
| 650 | 1 | 7 |
_aDatabescherming. _2gtt _0(NL-LeOCL)095650350 |
| 700 | 1 | _aMattord, Herbert J. | |
| 938 |
_aYBP Library Services _bYANK _n11109300 |
||
| 029 | 1 |
_aAU@ _b000054349100 |
|
| 029 | 1 |
_aNLGGC _b392692635 |
|
| 942 | _cBOOK | ||
| 994 |
_aZ0 _bSUPMU |
||
| 948 | _hNO HOLDINGS IN SUPMU - 43 OTHER HOLDINGS | ||
| 596 | _a1 2 | ||
| 999 |
_c8706 _d8706 |
||