Amazon cover image
Image from Amazon.com
Image from OpenLibrary

PRINCIPLES OF INFORMATION SECURITY / Michael E. Whitman, Herbert J. Mattord.

By: Contributor(s): Material type: TextTextPublisher: Boston, Mass. : Thomson Course Technology, 2005Copyright date: ©2005Edition: Second EditionDescription: xxiii, 576 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0619216255
  • 9780619216252
Subject(s): DDC classification:
  • 005.8 22
Online resources:
Contents:
Introduction to information security -- The need for security -- Legal, ethical, and professional issues in information security -- Risk management -- Planning for security -- Security technology: firewalls and VPNs -- Security technology: intrusion detection, access control, and other security tools -- Cryptography -- Physical security -- Implementing information security -- Security and personnel -- Information security maintenance.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Koleksi Pinjaman Terhad (Buku bertanda Merah) Koleksi Pinjaman Terhad (Buku bertanda Merah) PERPUSTAKAAN POLITEKNIK TUANKU SYED SIRAJUDDIN RAK 18 Koleksi Pinjaman Terhad (Buku bertanda Merah) RED 005.8 WHI (Browse shelf(Opens below)) Available 0000002010
Koleksi Umum (Rak Terbuka) Koleksi Umum (Rak Terbuka) PERPUSTAKAAN POLITEKNIK TUANKU SYED SIRAJUDDIN RAK 4 Koleksi Umum (Rak Terbuka) OS 005.8 WHI (Browse shelf(Opens below)) Available 0000002011
Koleksi Umum (Rak Terbuka) Koleksi Umum (Rak Terbuka) PERPUSTAKAAN POLITEKNIK TUANKU SYED SIRAJUDDIN RAK 4 Koleksi Umum (Rak Terbuka) OS 005.8 WHI (Browse shelf(Opens below)) Available 0000002012

Includes index.

Introduction to information security -- The need for security -- Legal, ethical, and professional issues in information security -- Risk management -- Planning for security -- Security technology: firewalls and VPNs -- Security technology: intrusion detection, access control, and other security tools -- Cryptography -- Physical security -- Implementing information security -- Security and personnel -- Information security maintenance.

There are no comments on this title.

to post a comment.