Introduction to information security : a strategic-based approach / Timothy J. Shimeall, Jonathan M. Spring.
By: Shimeall, Timothy [author.].
Contributor(s): Spring, Jonathan M [author.].
Material type:
BookPublisher: Amsterdam ; Boston : Elsevier, c2014Edition: First edition.Description: xxi, 360 pages : illustrations ; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781597499699 (pbk.).Subject(s): Telecommunication -- Security measures | Computer networks -- Security measures | Computer securityDDC classification: 005.8/SHI Online resources: Click here to access online Summary: "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- Provided by publisher.
| Item type | Current location | Call number | Copy number | Status | Date due | Barcode |
|---|---|---|---|---|---|---|
| E-book | CUET CENTRAL LIBRARY Online Resources (See in online) | 005.8/SHI (Browse shelf) | 1 | Not for loan | E-95 |
Browsing CUET CENTRAL LIBRARY Shelves , Shelving location: Online Resources (See in online) Close shelf browser
| 004.16/MAD The designer's guide to the Cortex-M processor family : | 004.678/HAI Internet of things A to Z : | 005.1/TIP Perspectives on data science for software engineering / | 005.8/SHI Introduction to information security : | 005.801/LEC Cybersecurity and applied mathematics / | 006.22/LYE Embedded computing and mechatronics with the PIC32 microcontroller / | 006.3/ZHI Intelligence science : |
Includes bibliographical references and index.
"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- Provided by publisher.
CSE
English
There are no comments for this item.