Welcome to the official i-CATS University College Library system. If you are a new user, please contact our librarian for registration.
Amazon cover image
Image from Amazon.com

Principles of information security / Michael E. Whitman and Herbert J. Mattord

By: Contributor(s): Material type: TextTextPublisher: Boston, Mass. : Thomson Course Technology, [2009]Copyright date: ℗♭2009Edition: Third editionDescription: xxvi, 598 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781423901778 (pbk)
  • 1423901770 (pbk)
  • 9780840031167 (pbk. : international student ed.)
  • 0840031165 (pbk. : international student ed.)
Subject(s): DDC classification:
  • 005.8 22
LOC classification:
  • TK5105.59 .W54 2009
Contents:
1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Status Date due Barcode
Books Books Dato Maznah Library & Information Services Open Collection TK Electrical engineering. Electronics. Nuclear engineering TK5105.59.W54 2009 (Browse shelf(Opens below)) Available 00001518

Includes bibliographical references and index

1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance

There are no comments on this title.

to post a comment.
Copyright CITM & Maznah Library, i-CATS University College 2025. All Rights Reserved

Powered by Koha