|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn864708951 |
003 |
OCoLC |
005 |
20231117044933.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
131205s2014 ne ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e rda
|e pn
|c OPELS
|d TEFOD
|d OCLCF
|d YDXCP
|d TOH
|d TEFOD
|d OCLCQ
|d TEFOD
|d OCLCQ
|d OCLCA
|d UKAHL
|d SFB
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 867121908
|a 1150177700
|a 1162467997
|a 1167840978
|
020 |
|
|
|a 9781597499729
|q (electronic bk.)
|
020 |
|
|
|a 1597499722
|q (electronic bk.)
|
020 |
|
|
|z 9781597499699
|
020 |
|
|
|z 1597499692
|
035 |
|
|
|a (OCoLC)864708951
|z (OCoLC)867121908
|z (OCoLC)1150177700
|z (OCoLC)1162467997
|z (OCoLC)1167840978
|
050 |
|
4 |
|a TK5102.85
|b .S53 2014eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Shimeall, Timothy,
|e author.
|
245 |
1 |
0 |
|a Introduction to information security :
|b a strategic-based approach /
|c Timothy Shimeall, Jonathan M. Spring.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Amsterdam :
|b Syngress, an imprint of Elsevier,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"--
|c Provided by publisher
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Telecommunication
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a T�el�ecommunications
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0221593
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Telecommunication
|x Security measures
|2 fast
|0 (OCoLC)fst01145928
|
700 |
1 |
|
|a Spring, Jonathan M.,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Shimeall, Timothy.
|t Introduction to information security.
|b First edition
|z 9781597499699
|w (DLC) 2013044944
|w (OCoLC)863044290
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597499699
|z Texto completo
|