Engineering information security: the application of systems engineering concepts to achieve information assurance
"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
c2011
|
Schriftenreihe: | IEEE press series on information and communication networks security
13 |
Schlagworte: | |
Online-Zugang: | FHI01 FHN01 Volltext |
Zusammenfassung: | "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher |
Beschreibung: | Some online versions lack accompanying media packaged with the printed version. - Includes index Description based on PDF viewed 12/21/2015 |
Beschreibung: | 1 Online-Resource (xxv, 700 pages) illustrations |
ISBN: | 9780470947913 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV046418425 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200211s2011 |||| o||u| ||||||eng d | ||
020 | |a 9780470947913 |9 978-0-470-94791-3 | ||
035 | |a (ZDB-35-WEL)6047604 | ||
035 | |a (OCoLC)1141114333 | ||
035 | |a (DE-599)BVBBV046418425 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-92 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Jacobs, Stuart |e Verfasser |4 aut | |
245 | 1 | 0 | |a Engineering information security |b the application of systems engineering concepts to achieve information assurance |c Stuart Jacobs |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c c2011 | |
300 | |a 1 Online-Resource (xxv, 700 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IEEE press series on information and communication networks security |v 13 | |
500 | |a Some online versions lack accompanying media packaged with the printed version. - Includes index | ||
500 | |a Description based on PDF viewed 12/21/2015 | ||
520 | |a "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher | ||
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780470565124 |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WEL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031830897 | ||
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604 |l FHI01 |p ZDB-35-WEL |x Aggregator |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604 |l FHN01 |p ZDB-35-WEL |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180961820147712 |
---|---|
any_adam_object | |
author | Jacobs, Stuart |
author_facet | Jacobs, Stuart |
author_role | aut |
author_sort | Jacobs, Stuart |
author_variant | s j sj |
building | Verbundindex |
bvnumber | BV046418425 |
collection | ZDB-35-WEL |
ctrlnum | (ZDB-35-WEL)6047604 (OCoLC)1141114333 (DE-599)BVBBV046418425 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02570nmm a2200433zcb4500</leader><controlfield tag="001">BV046418425</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200211s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470947913</subfield><subfield code="9">978-0-470-94791-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WEL)6047604</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1141114333</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046418425</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jacobs, Stuart</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering information security</subfield><subfield code="b">the application of systems engineering concepts to achieve information assurance</subfield><subfield code="c">Stuart Jacobs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (xxv, 700 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE press series on information and communication networks security</subfield><subfield code="v">13</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Some online versions lack accompanying media packaged with the printed version. - Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on PDF viewed 12/21/2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780470565124</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031830897</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046418425 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:44:05Z |
institution | BVB |
isbn | 9780470947913 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031830897 |
oclc_num | 1141114333 |
open_access_boolean | |
owner | DE-573 DE-92 |
owner_facet | DE-573 DE-92 |
physical | 1 Online-Resource (xxv, 700 pages) illustrations |
psigel | ZDB-35-WEL |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
series2 | IEEE press series on information and communication networks security |
spelling | Jacobs, Stuart Verfasser aut Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs Hoboken, New Jersey Wiley c2011 1 Online-Resource (xxv, 700 pages) illustrations txt rdacontent c rdamedia cr rdacarrier IEEE press series on information and communication networks security 13 Some online versions lack accompanying media packaged with the printed version. - Includes index Description based on PDF viewed 12/21/2015 "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society."--Provided by publisher Data protection Information technology Security measures Computer networks Security measures Computer security Erscheint auch als Druck-Ausgabe 9780470565124 https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604 Aggregator URL des Erstveröffentlichers Volltext |
spellingShingle | Jacobs, Stuart Engineering information security the application of systems engineering concepts to achieve information assurance Data protection Information technology Security measures Computer networks Security measures Computer security |
title | Engineering information security the application of systems engineering concepts to achieve information assurance |
title_auth | Engineering information security the application of systems engineering concepts to achieve information assurance |
title_exact_search | Engineering information security the application of systems engineering concepts to achieve information assurance |
title_full | Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs |
title_fullStr | Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs |
title_full_unstemmed | Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs |
title_short | Engineering information security |
title_sort | engineering information security the application of systems engineering concepts to achieve information assurance |
title_sub | the application of systems engineering concepts to achieve information assurance |
topic | Data protection Information technology Security measures Computer networks Security measures Computer security |
topic_facet | Data protection Information technology Security measures Computer networks Security measures Computer security |
url | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604 |
work_keys_str_mv | AT jacobsstuart engineeringinformationsecuritytheapplicationofsystemsengineeringconceptstoachieveinformationassurance |