Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.
Series: IEEE Press series on information & communication networks securityPublication details: Hoboken, N.J. : Wiley c2011.Description: xxv, 700 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN:- 9780470565124 (hbk)
- 0470565128 (hbk)
| Item type | Current library | Home library | Collection | Call number | Materials specified | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|---|---|
| AM | PERPUSTAKAAN LINGKUNGAN KEDUA | PERPUSTAKAAN LINGKUNGAN KEDUA KOLEKSI AM-P. LINGKUNGAN KEDUA | - | QA76.9.A25J337 3 (Browse shelf(Opens below)) | 1 | Available | 00002079496 | |||
| MEDIA | PERPUSTAKAAN LINGKUNGAN KEDUA | PERPUSTAKAAN LINGKUNGAN KEDUA MEDIA-P. LINGKUNGAN KEDUA | - | QA76.9.A25J337 3 (Browse shelf(Opens below)) | cd-rom | 1 | Available | 00002209762 |
Includes index.
'Book is accompanied by one computer optical disc entitle' Engineering information security : the application of systems engineering concepts to achieve information assurance' bearing the same call number and available at Bahagian Koleksi Media.
'Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society.'--Provided by publisher.
'This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society'--Provided by publisher.
There are no comments on this title.
