Engineering information security: the application of systems engineering concepts to achieve information assurance
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley
© 2011
|
Schriftenreihe: | IEEE Press series on information & communication networks security
|
Schlagworte: | |
Online-Zugang: | FRO01 UBY01 UBG01 Volltext |
Beschreibung: | Some online versions lack accompanying media packaged with the printed version Includes bibliographical references and index "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher |
Beschreibung: | 1 Online-Ressource (xxv, 700 pages) |
ISBN: | 9780470947913 0470947918 9780470947838 0470947837 9780470565124 0470565128 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043393462 | ||
003 | DE-604 | ||
005 | 20180118 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2011 |||| o||u| ||||||eng d | ||
020 | |a 9780470947913 |c electronic bk |9 978-0-470-94791-3 | ||
020 | |a 0470947918 |c electronic bk |9 0-470-94791-8 | ||
020 | |a 9780470947838 |c electronic bk |9 978-0-470-94783-8 | ||
020 | |a 0470947837 |c electronic bk |9 0-470-94783-7 | ||
020 | |a 9780470565124 |9 978-0-470-56512-4 | ||
020 | |a 0470565128 |9 0-470-56512-8 | ||
024 | 7 | |a 10.1002/9780470947913 |2 doi | |
035 | |a (ZDB-35-WIC)ocn747427270 | ||
035 | |a (OCoLC)747427270 | ||
035 | |a (DE-599)BVBBV043393462 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-706 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Jacobs, Stuart |e Verfasser |4 aut | |
245 | 1 | 0 | |a Engineering information security |b the application of systems engineering concepts to achieve information assurance |c Stuart Jacobs |
264 | 1 | |a Hoboken, N.J. |b Wiley |c © 2011 | |
300 | |a 1 Online-Ressource (xxv, 700 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IEEE Press series on information & communication networks security | |
500 | |a Some online versions lack accompanying media packaged with the printed version | ||
500 | |a Includes bibliographical references and index | ||
500 | |a "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Data protection | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028812046 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175971013623808 |
---|---|
any_adam_object | |
author | Jacobs, Stuart |
author_facet | Jacobs, Stuart |
author_role | aut |
author_sort | Jacobs, Stuart |
author_variant | s j sj |
building | Verbundindex |
bvnumber | BV043393462 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn747427270 (OCoLC)747427270 (DE-599)BVBBV043393462 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03472nmm a2200637zc 4500</leader><controlfield tag="001">BV043393462</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180118 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470947913</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-0-470-94791-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470947918</subfield><subfield code="c">electronic bk</subfield><subfield code="9">0-470-94791-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470947838</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-0-470-94783-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470947837</subfield><subfield code="c">electronic bk</subfield><subfield code="9">0-470-94783-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470565124</subfield><subfield code="9">978-0-470-56512-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470565128</subfield><subfield code="9">0-470-56512-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9780470947913</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn747427270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)747427270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043393462</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jacobs, Stuart</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering information security</subfield><subfield code="b">the application of systems engineering concepts to achieve information assurance</subfield><subfield code="c">Stuart Jacobs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley</subfield><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxv, 700 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE Press series on information & communication networks security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Some online versions lack accompanying media packaged with the printed version</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028812046</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043393462 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:45Z |
institution | BVB |
isbn | 9780470947913 0470947918 9780470947838 0470947837 9780470565124 0470565128 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028812046 |
oclc_num | 747427270 |
open_access_boolean | |
owner | DE-861 DE-706 |
owner_facet | DE-861 DE-706 |
physical | 1 Online-Ressource (xxv, 700 pages) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
series2 | IEEE Press series on information & communication networks security |
spelling | Jacobs, Stuart Verfasser aut Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs Hoboken, N.J. Wiley © 2011 1 Online-Ressource (xxv, 700 pages) txt rdacontent c rdamedia cr rdacarrier IEEE Press series on information & communication networks security Some online versions lack accompanying media packaged with the printed version Includes bibliographical references and index "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher Computer networks / Security measures Computer security Data protection COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data protection fast Information technology / Security measures fast Information technology / Security measures https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Jacobs, Stuart Engineering information security the application of systems engineering concepts to achieve information assurance Computer networks / Security measures Computer security Data protection COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data protection fast Information technology / Security measures fast Information technology / Security measures |
title | Engineering information security the application of systems engineering concepts to achieve information assurance |
title_auth | Engineering information security the application of systems engineering concepts to achieve information assurance |
title_exact_search | Engineering information security the application of systems engineering concepts to achieve information assurance |
title_full | Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs |
title_fullStr | Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs |
title_full_unstemmed | Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs |
title_short | Engineering information security |
title_sort | engineering information security the application of systems engineering concepts to achieve information assurance |
title_sub | the application of systems engineering concepts to achieve information assurance |
topic | Computer networks / Security measures Computer security Data protection COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data protection fast Information technology / Security measures fast Information technology / Security measures |
topic_facet | Computer networks / Security measures Computer security Data protection COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Information technology / Security measures |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9780470947913 |
work_keys_str_mv | AT jacobsstuart engineeringinformationsecuritytheapplicationofsystemsengineeringconceptstoachieveinformationassurance |