| 000 | 01789cam a2200301 i 4500 | ||
|---|---|---|---|
| 001 | 32352 | ||
| 005 | 20230423231423.0 | ||
| 008 | 140910s2014 ne a b 001 0 eng | ||
| 020 | _a9781597499699 (pbk.) | ||
| 049 | _bPITLIB | ||
| 050 | 0 | 0 |
_aTK5102.85 _b.S556 |
| 100 | 1 |
_aShimeall, Timothy, _eauthor _941950 |
|
| 245 | 1 | 0 |
_aIntroduction to information security : _ba strategic-based approach / _cTimothy J. Shimeall, Jonathan M. Spring _h[book] |
| 250 | _aFirst edition | ||
| 260 | 1 |
_aBoston : _aBoston : _bSyngress, an imprint of Elsevier, _c2014. _941949 |
|
| 300 |
_axxi, 360 pages : _billustrations |
||
| 449 | 0 | _a•u005– New Arrivals- Sep. 2014 | |
| 504 | _aIncludes bibliographical references and index | ||
| 520 | _a"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details" | ||
| 650 | 0 |
_aTelecommunication _xSecurity measures _917923 |
|
| 650 | 4 |
_aComputer networks _xSecurity measures _95919 |
|
| 650 | 4 |
_aComputer security _923769 |
|
| 690 | 0 |
_a0023 วิศวกรรมศาสตรบัณฑิต สาขาวิศวกรรมคอมพิวเตอร์ CPE (ป.ตรี) _965 |
|
| 700 | 1 |
_aSpring, Jonathan M., _eauthor _941951 |
|
| 942 | _cBK | ||
| 988 | _c32352 | ||
| 999 |
_c32352 _d32352 |
||