Amazon cover image
Image from Amazon.com

Introduction to information security : a strategic-based approach

By: Shimeall,Timothy | Spring, Jonathan MPublication details: Amsterdam ; Steve Elliot, c2014. Edition: 1st edDescription: xxi, 360 p. : ill. ; 23 cmISBN: 9781597499699Subject(s): 1. Telecommunication -- Security measures. 2. Computer networks -- Security measures. 3. Computer securityDDC classification: 005.8 SHI
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Status Date due Barcode Item holds
English Lending English Lending Villa College Library
Villa College Library
005.8 SHI (Browse shelf(Opens below)) Available 13729
English Lending English Lending Villa College Library
Villa College Library
005.8 SHI (Browse shelf(Opens below)) Available 9542
English Lending English Lending Villa College Library
Villa College Library
005.8 SHI (Browse shelf(Opens below)) Available 9543
English Lending English Lending Villa College Library
Villa College Library
005.8 SHI (Browse shelf(Opens below)) Available 8807
English Lending English Lending Villa College Library
Villa College Library
005.8 SHI (Browse shelf(Opens below)) Available 8808
Total holds: 0

Introduction
Chapter 1: Motivation and Security Definitions
Chapter 2: Strategies and Security
Chapter 3: Deception Strategies: Networks, Organization, and Structures
Chapter 4: Deception Strategies: Defensive Technologies
Chapter 5: Frustration Strategies: Technical Controls
Chapter 6: Frustration Strategies: Formal Verification
Chapter 7: Resistance Strategies: Authentication and Permissions
Chapter 8: Resistance Strategies: Symmetric Encryption
Chapter 9: Resistance Strategies: Partitioning and Need to Know
Chapter 10: Change Management
Chapter 11: Network Analysis and Forensics
Chapter 12: Recognition Strategies: Intrusion Detection and Prevention
Chapter 13: Digital Forensics
Chapter 14: Recognition Strategies: Integrity Detection
Chapter 15: Recovery of Security
Chapter 16: Professional Certifications and Overall Conclusions

There are no comments on this title.

to post a comment.