Cargando…

Introduction to information security : a strategic-based approach /

"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strate...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Shimeall, Timothy (Autor), Spring, Jonathan M. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Syngress, an imprint of Elsevier, 2014.
Edición:First edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn864708951
003 OCoLC
005 20231117044933.0
006 m o d
007 cr cnu---unuuu
008 131205s2014 ne ob 001 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d TEFOD  |d OCLCF  |d YDXCP  |d TOH  |d TEFOD  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCA  |d UKAHL  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 867121908  |a 1150177700  |a 1162467997  |a 1167840978 
020 |a 9781597499729  |q (electronic bk.) 
020 |a 1597499722  |q (electronic bk.) 
020 |z 9781597499699 
020 |z 1597499692 
035 |a (OCoLC)864708951  |z (OCoLC)867121908  |z (OCoLC)1150177700  |z (OCoLC)1162467997  |z (OCoLC)1167840978 
050 4 |a TK5102.85  |b .S53 2014eb 
082 0 4 |a 005.8  |2 23 
100 1 |a Shimeall, Timothy,  |e author. 
245 1 0 |a Introduction to information security :  |b a strategic-based approach /  |c Timothy Shimeall, Jonathan M. Spring. 
250 |a First edition. 
264 1 |a Amsterdam :  |b Syngress, an imprint of Elsevier,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"--  |c Provided by publisher 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
546 |a English. 
650 0 |a Telecommunication  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a T�el�ecommunications  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0221593 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Telecommunication  |x Security measures  |2 fast  |0 (OCoLC)fst01145928 
700 1 |a Spring, Jonathan M.,  |e author. 
776 0 8 |i Print version:  |a Shimeall, Timothy.  |t Introduction to information security.  |b First edition  |z 9781597499699  |w (DLC) 2013044944  |w (OCoLC)863044290 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597499699  |z Texto completo