000 01789cam a2200301 i 4500
001 32352
005 20230423231423.0
008 140910s2014 ne a b 001 0 eng
020 _a9781597499699 (pbk.)
049 _bPITLIB
050 0 0 _aTK5102.85
_b.S556
100 1 _aShimeall, Timothy,
_eauthor
_941950
245 1 0 _aIntroduction to information security :
_ba strategic-based approach /
_cTimothy J. Shimeall, Jonathan M. Spring
_h[book]
250 _aFirst edition
260 1 _aBoston :
_aBoston :
_bSyngress, an imprint of Elsevier,
_c2014.
_941949
300 _axxi, 360 pages :
_billustrations
449 0 _a•u005– New Arrivals- Sep. 2014
504 _aIncludes bibliographical references and index
520 _a"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"
650 0 _aTelecommunication
_xSecurity measures
_917923
650 4 _aComputer networks
_xSecurity measures
_95919
650 4 _aComputer security
_923769
690 0 _a0023 วิศวกรรมศาสตรบัณฑิต สาขาวิศวกรรมคอมพิวเตอร์ CPE (ป.ตรี)
_965
700 1 _aSpring, Jonathan M.,
_eauthor
_941951
942 _cBK
988 _c32352
999 _c32352
_d32352