Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.
Series: IEEE Press series on information & communication networks securityPublication details: Hoboken, N.J. : Wiley c2011.Description: xxv, 700 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN:- 9780470565124 (hbk)
- 0470565128 (hbk)
| Item type | Current library | Home library | Collection | Call number | Materials specified | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|---|---|
| AM | PERPUSTAKAAN LINGKUNGAN KEDUA | PERPUSTAKAAN LINGKUNGAN KEDUA KOLEKSI AM-P. LINGKUNGAN KEDUA | - | QA76.9.A25J337 3 (Browse shelf(Opens below)) | 1 | Available | 00002079496 | |||
| MEDIA | PERPUSTAKAAN LINGKUNGAN KEDUA | PERPUSTAKAAN LINGKUNGAN KEDUA MEDIA-P. LINGKUNGAN KEDUA | - | QA76.9.A25J337 3 (Browse shelf(Opens below)) | cd-rom | 1 | Available | 00002209762 |
Browsing PERPUSTAKAAN LINGKUNGAN KEDUA shelves, Shelving location: KOLEKSI AM-P. LINGKUNGAN KEDUA Close shelf browser (Hides shelf browser)
|
No cover image available |
|
|
|
|
|
||
| QA76.9.A25I54165 2007 3 Information security management handbook / | QA76.9.A25I541652 2007 3 Information security management handbook / | QA76.9.A25I857 3 Menentang spyware dan malware / | QA76.9.A25J337 3 Engineering information security : the application of systems engineering concepts to achieve information assurance / | QA76.9.A25K33 2015 3 Introduction to modern cryptography / | QA76.9.A25K447 3 Kesedaran keselamatan siber / | QA76.9.A25L343 3 Machine learning with R : learn how to use R to apply powerful machine learning methods and gain an insight into real-world applications / |
Includes index.
'Book is accompanied by one computer optical disc entitle' Engineering information security : the application of systems engineering concepts to achieve information assurance' bearing the same call number and available at Bahagian Koleksi Media.
'Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society.'--Provided by publisher.
'This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society'--Provided by publisher.
There are no comments on this title.
