Cargando…

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn881184273
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 140609s2014 inua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCO  |d DEBBG  |d DEBSZ  |d S4S  |d COO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d YDX  |d N$T  |d OCLCA  |d REB  |d OCLCQ  |d CEF  |d WYU  |d AU@  |d VT2  |d OCLCQ  |d OCLCO  |d UKAHL  |d OCLCQ 
020 |a 9780133589627  |q (electronic bk.) 
020 |a 0133589625  |q (electronic bk.) 
020 |a 0789753251 
020 |a 9780789753250 
020 |z 9780133589412 
020 |z 0133589412 
020 |z 9780789753250 
020 |z 0789753251 
024 3 |a 9780789753250 
029 1 |a DEBBG  |b BV042031885 
029 1 |a DEBSZ  |b 414173465 
029 1 |a GBVCP  |b 796785945 
035 |a (OCoLC)881184273 
037 |a CL0500000441  |b Safari Books Online 
050 4 |a QA76.9.A25  |b M475 2014 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Merkow, Mark S. 
245 1 0 |a Information security :  |b principles and practices /  |c Mark S. Merkow, Jim Breithaupt. 
250 |a 2nd ed. 
260 |a Indianapolis, Ind. :  |b Pearson Education,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Certification/Training Ser. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed November 9, 2017). 
500 |a Includes index. 
520 8 |a Annotation  |b Information Security: Principles and Practices, Second EditionEverything You Need to Know About Modern Computer Security, in One BookClearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)2 CBK]. Thoroughly updated for today's challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career. Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Two highly experienced security practitioners have brought together all the foundational knowledge you need to succeed in today's IT and business environments. They offer easy-to-understand, practical coverage of topics ranging from security management and physical security to cryptography and application development security. This edition fully addresses new trends that are transforming security, from cloud services to mobile applications, "Bring Your Own Device" (BYOD) strategies to today's increasingly rigorous compliance requirements. Throughout, you'll find updated case studies, review questions, and exercises-all designed to reveal today's real-world IT security challenges and help you overcome them. Learn how to-- Recognize the evolving role of IT security-- Identify the best new opportunities in the field-- Discover today's core information security principles of success-- Understand certification programs and the CBK-- Master today's best practices for governance and risk management-- Architect and design systems to maximize security-- Plan for business continuity-- Understand the legal, investigatory, and ethical requirements associated with IT security-- Improve physical and operational security-- Implement effective access control systems-- Effectively utilize cryptography-- Improve network and Internet security-- Build more secure software-- Define more effective security policies and standards-- Preview the future of information security. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Internet  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
650 7 |a Internet  |x Security measures.  |2 fast  |0 (OCoLC)fst01751426 
700 1 |a Breithaupt, Jim,  |d 1955- 
830 0 |a Certification/Training Ser. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780133589412/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37803743 
938 |a YBP Library Services  |b YANK  |n 18082029 
938 |a EBSCOhost  |b EBSC  |n 1600914 
938 |a YBP Library Services  |b YANK  |n 14855835 
994 |a 92  |b IZTAP