Principles of information security:
Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston, Mass.
Course Technology/Cengage Learning
c2009
|
Ausgabe: | 3rd ed., internat ed. |
Schlagworte: | |
Zusammenfassung: | Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses |
Beschreibung: | Includes bibliographical references and index 1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance |
Beschreibung: | xxvi, 598 S. ill. 24 cm |
ISBN: | 9780840031167 0840031165 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV037393230 | ||
003 | DE-604 | ||
005 | 20110527 | ||
007 | t | ||
008 | 110511s2009 a||| |||| 00||| eng d | ||
015 | |a BA3-Z0574 |2 dnb | ||
020 | |a 9780840031167 |9 978-0-8400-3116-7 | ||
020 | |a 0840031165 |9 0-8400-3116-5 | ||
035 | |a (OCoLC)212428605 | ||
035 | |a (DE-599)BVBBV037393230 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-522 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Whitman, Michael E. |d 1964- |e Verfasser |0 (DE-588)173003621 |4 aut | |
245 | 1 | 0 | |a Principles of information security |c Michael E. Whitman ; Herbert J. Mattord |
250 | |a 3rd ed., internat ed. | ||
264 | 1 | |a Boston, Mass. |b Course Technology/Cengage Learning |c c2009 | |
300 | |a xxvi, 598 S. |b ill. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a 1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance | ||
520 | |a Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Redes de computadoras / Medidas de seguridad | |
650 | 4 | |a Seguridad informática | |
650 | 4 | |a Tecnología de la información / Medidas de seguridad | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mattord, Herbert J. |e Verfasser |4 aut | |
999 | |a oai:aleph.bib-bvb.de:BVB01-022546075 |
Datensatz im Suchindex
_version_ | 1804145683210436608 |
---|---|
any_adam_object | |
author | Whitman, Michael E. 1964- Mattord, Herbert J. |
author_GND | (DE-588)173003621 |
author_facet | Whitman, Michael E. 1964- Mattord, Herbert J. |
author_role | aut aut |
author_sort | Whitman, Michael E. 1964- |
author_variant | m e w me mew h j m hj hjm |
building | Verbundindex |
bvnumber | BV037393230 |
ctrlnum | (OCoLC)212428605 (DE-599)BVBBV037393230 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 3rd ed., internat ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02418nam a2200493 c 4500</leader><controlfield tag="001">BV037393230</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110527 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110511s2009 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">BA3-Z0574</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780840031167</subfield><subfield code="9">978-0-8400-3116-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0840031165</subfield><subfield code="9">0-8400-3116-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)212428605</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV037393230</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Whitman, Michael E.</subfield><subfield code="d">1964-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)173003621</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of information security</subfield><subfield code="c">Michael E. Whitman ; Herbert J. Mattord</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd ed., internat ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, Mass.</subfield><subfield code="b">Course Technology/Cengage Learning</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 598 S.</subfield><subfield code="b">ill.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Redes de computadoras / Medidas de seguridad</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Seguridad informática</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tecnología de la información / Medidas de seguridad</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mattord, Herbert J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022546075</subfield></datafield></record></collection> |
id | DE-604.BV037393230 |
illustrated | Illustrated |
indexdate | 2024-07-09T23:23:21Z |
institution | BVB |
isbn | 9780840031167 0840031165 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022546075 |
oclc_num | 212428605 |
open_access_boolean | |
owner | DE-522 |
owner_facet | DE-522 |
physical | xxvi, 598 S. ill. 24 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Course Technology/Cengage Learning |
record_format | marc |
spelling | Whitman, Michael E. 1964- Verfasser (DE-588)173003621 aut Principles of information security Michael E. Whitman ; Herbert J. Mattord 3rd ed., internat ed. Boston, Mass. Course Technology/Cengage Learning c2009 xxvi, 598 S. ill. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index 1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses Computer networks / Security measures Computer security Information technology / Security measures Redes de computadoras / Medidas de seguridad Seguridad informática Tecnología de la información / Medidas de seguridad Databescherming gtt Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s DE-604 Mattord, Herbert J. Verfasser aut |
spellingShingle | Whitman, Michael E. 1964- Mattord, Herbert J. Principles of information security Computer networks / Security measures Computer security Information technology / Security measures Redes de computadoras / Medidas de seguridad Seguridad informática Tecnología de la información / Medidas de seguridad Databescherming gtt Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4011144-1 |
title | Principles of information security |
title_auth | Principles of information security |
title_exact_search | Principles of information security |
title_full | Principles of information security Michael E. Whitman ; Herbert J. Mattord |
title_fullStr | Principles of information security Michael E. Whitman ; Herbert J. Mattord |
title_full_unstemmed | Principles of information security Michael E. Whitman ; Herbert J. Mattord |
title_short | Principles of information security |
title_sort | principles of information security |
topic | Computer networks / Security measures Computer security Information technology / Security measures Redes de computadoras / Medidas de seguridad Seguridad informática Tecnología de la información / Medidas de seguridad Databescherming gtt Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer networks / Security measures Computer security Information technology / Security measures Redes de computadoras / Medidas de seguridad Seguridad informática Tecnología de la información / Medidas de seguridad Databescherming Rechnernetz Datensicherung |
work_keys_str_mv | AT whitmanmichaele principlesofinformationsecurity AT mattordherbertj principlesofinformationsecurity |