Introduction to information security : a strategic-based approach /
"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strate...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
U.S.A ;
Elsevier ;
2014
Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2014. |
Phiên bản: | First edition. |
Những chủ đề: | |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường CĐ Kỹ Thuật Cao Thắng |
---|
LEADER | 01930cam a2200361 i 4500 | ||
---|---|---|---|
001 | TVCDKTCT98789 | ||
005 | 20180703073330.5 | ||
008 | 131113s2014 ne a b 001 0 eng | ||
980 | \ | \ | |a Thư viện Trường CĐ Kỹ Thuật Cao Thắng |
024 | |a RG_1 #1 eb0 i1 | ||
010 | |a 2013044944 | ||
020 | |a 9781597499699 | ||
040 | |a DLC |b eng |c DLC |e rda |d DLC | ||
042 | |a pcc | ||
050 | 0 | 0 | |a TK5102.85 |b .S53 2014 |
082 | 0 | 0 | |a 005.8 |b I-312R |
100 | 1 | |a Shimeall, Timothy, |e author. | |
245 | 1 | 0 | |a Introduction to information security : |b a strategic-based approach / |c Timothy J. Shimeall, Jonathan M. Spring. |
250 | |a First edition. | ||
260 | # | # | |a U.S.A ; |b Elsevier ; |c 2014 |
264 | 1 | |a Amsterdam ; |a Boston : |b Syngress, an imprint of Elsevier, |c 2014. | |
300 | |a xxi, 360 pages : |b illustrations ; |c 24 cm | ||
336 | |a text |2 rdacontent | ||
337 | |a unmediated |2 rdamedia | ||
338 | |a volume |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- |c Provided by publisher. | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Telecommunication |x Security measures. | |
700 | 1 | |a Spring, Jonathan M., |e author. | |
721 | # | # | |a Công nghệ thông tin |
841 | # | # | |b Kho Sách |j 100050927 |