Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.
Series: IEEE Press series on information & communication networks securityPublication details: Hoboken, N.J. : Wiley c2011.Description: xxv, 700 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN:- 9780470565124 (hbk)
- 0470565128 (hbk)
| Item type | Current library | Home library | Collection | Call number | Materials specified | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|---|---|
| AM | PERPUSTAKAAN LINGKUNGAN KEDUA | PERPUSTAKAAN LINGKUNGAN KEDUA KOLEKSI AM-P. LINGKUNGAN KEDUA | - | QA76.9.A25J337 3 (Browse shelf(Opens below)) | 1 | Available | 00002079496 | |||
| MEDIA | PERPUSTAKAAN LINGKUNGAN KEDUA | PERPUSTAKAAN LINGKUNGAN KEDUA MEDIA-P. LINGKUNGAN KEDUA | - | QA76.9.A25J337 3 (Browse shelf(Opens below)) | cd-rom | 1 | Available | 00002209762 |
Browsing PERPUSTAKAAN LINGKUNGAN KEDUA shelves, Shelving location: MEDIA-P. LINGKUNGAN KEDUA Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| QA76.9.A25C49 3 Hack attacks testing : how to conduct your own security audit / | QA76.9.A25G744 3 CISSP guide to security essentials / | QA76.9.A25I857 3 Menentang spyware dan malware / | QA76.9.A25J337 3 Engineering information security : the application of systems engineering concepts to achieve information assurance / | QA76.9.A25M36 3 Hacker attack / | QA76.9.A25P56 3 Halting the hacker : a practical guide to computer security / | QA76.9.A25P739 3 Principles of computer security : security + TM and beyond / |
Includes index.
'Book is accompanied by one computer optical disc entitle' Engineering information security : the application of systems engineering concepts to achieve information assurance' bearing the same call number and available at Bahagian Koleksi Media.
'Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society.'--Provided by publisher.
'This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society'--Provided by publisher.
There are no comments on this title.
