Introduction to information security : a strategic-based approach /

"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strate...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Shimeall, Timothy (Tác giả), Spring, Jonathan M. (Tác giả)
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: U.S.A ; Elsevier ; 2014
Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2014.
Phiên bản:First edition.
Những chủ đề:
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường CĐ Kỹ Thuật Cao Thắng
LEADER 01930cam a2200361 i 4500
001 TVCDKTCT98789
005 20180703073330.5
008 131113s2014 ne a b 001 0 eng
980 \ \ |a Thư viện Trường CĐ Kỹ Thuật Cao Thắng 
024 |a RG_1 #1 eb0 i1 
010 |a 2013044944 
020 |a 9781597499699 
040 |a DLC   |b eng   |c DLC   |e rda   |d DLC 
042 |a pcc 
050 0 0 |a TK5102.85   |b .S53 2014 
082 0 0 |a 005.8   |b I-312R 
100 1 |a Shimeall, Timothy,   |e author. 
245 1 0 |a Introduction to information security :   |b a strategic-based approach /   |c Timothy J. Shimeall, Jonathan M. Spring. 
250 |a First edition. 
260 # # |a U.S.A ;   |b Elsevier ;   |c 2014 
264 1 |a Amsterdam ;   |a Boston :   |b Syngress, an imprint of Elsevier,   |c 2014. 
300 |a xxi, 360 pages :   |b illustrations ;   |c 24 cm 
336 |a text   |2 rdacontent 
337 |a unmediated   |2 rdamedia 
338 |a volume   |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"--   |c Provided by publisher. 
650 0 |a Computer networks   |x Security measures. 
650 0 |a Computer security. 
650 0 |a Telecommunication   |x Security measures. 
700 1 |a Spring, Jonathan M.,   |e author. 
721 # # |a Công nghệ thông tin 
841 # # |b Kho Sách   |j 100050927