000 | 02794cam a22003974a 4500 | ||
---|---|---|---|
001 | 16313875 | ||
003 | OSt | ||
005 | 20250714164829.0 | ||
007 | co |g||||||||| | ||
008 | 100702s2011 njua 001 0 eng | ||
010 | _a 2010028408 | ||
020 |
_a9780470565124 _qhardback |
||
020 |
_a0470565128 _qhardback |
||
035 | _a16313875 | ||
035 | _a(OCoLC)500823574 | ||
040 |
_aDLC _cDLC _dYDX _dBTCTA _dCDX _dYDXCP _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bJ325 2011 |
082 | 0 | 0 |
_a005.8 _222 |
100 | 1 |
_aJacobs, Stuart. _eauthor |
|
245 | 1 | 0 |
_aEngineering Information Security : _bThe Application of Systems Engineering Concepts to Achieve Information Assurance / _cStuart Jacobs. |
260 |
_aHoboken, N.J. : _bWiley : _bIEEE Press, _cc2011. |
||
300 |
_axxv, 700 p. : _bill. ; _c24 cm. + _e1 CD-ROM (4 3/4 in.). |
||
490 | 1 | _aIEEE Press series on information & communication networks security | |
500 | _aIncludes index. | ||
520 | _a"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher. | ||
520 | _a"This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society"--Provided by publisher. | ||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aInformation technology _xSecurity measures. |
|
650 | 0 | _aData protection. | |
830 | 0 | _aIEEE Press series on information & communication networks security. | |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK _n0 |
||
999 |
_c1833 _d1833 |