Principles of information security:
Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boston, MA
Cengage
[2022]
|
Ausgabe: | Seventh edition |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032806998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Zusammenfassung: | Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses |
Beschreibung: | Includes bibliographical references and index 1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance |
Umfang: | XX, 536 Seiten Diagramme |
ISBN: | 9780357506431 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047406017 | ||
003 | DE-604 | ||
005 | 20210910 | ||
007 | t| | ||
008 | 210809s2022 xx |||| |||| 00||| eng d | ||
020 | |a 9780357506431 |9 978-0-357-50643-1 | ||
035 | |a (OCoLC)1268181242 | ||
035 | |a (DE-599)BVBBV047406017 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-898 |a DE-20 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Whitman, Michael E. |d 1964- |e Verfasser |0 (DE-588)173003621 |4 aut | |
245 | 1 | 0 | |a Principles of information security |c Michael E. Whitman (Ph.D., CISM, CISSP), Herbert J. Mattord (Ph.D., CISM, CISSP) |
250 | |a Seventh edition | ||
264 | 1 | |a Boston, MA |b Cengage |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a XX, 536 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a 1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance | ||
520 | |a Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Redes de computadoras / Medidas de seguridad | |
650 | 4 | |a Seguridad informática | |
650 | 4 | |a Tecnología de la información / Medidas de seguridad | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mattord, Herbert J. |e Verfasser |0 (DE-588)1061152685 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032806998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032806998 |
Datensatz im Suchindex
_version_ | 1819247095603789824 |
---|---|
adam_text | Brief Contents Preface xi Security Technology: Access Controls, Firewalls, and VPNs Module 1 Introduction to Information Security Module 2 The Need for Information Security Module 9 շ7 gl 121 175 Module 6 Legal, Ethical, and Professional Issues in Information Security 223 Module 7 Security and Personnel 337 Cryptography 383 Module 11 Module 5 Incident Response and Contingency Planning Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools Module 10 Module 4 Risk Management 295 1 Module 3 Information Security Management Module 8 261 Implementing Information Security 417 Module 12 Information Security Maintenance 447 GLOSSARY 505 INDEX 527
Table of Contents Preface xi Module 1 Introduction to Information Security 1 Introduction To Information Security 2 The 1960s The 1970s and’80s The 1990s 2000 to Present What Is Security? Key Information Security Concepts Critical Characteristics of Information CNSS Security Model Components Of An Information System Software Hardware Data People Procedures Networks Security And The Organization Balancing Information Security and Access Approaches to Information Security Implementation Security Professionals Data Responsibilities Communities of Interest Information Security: Is It An Art Or A Science? Security as Art Security as Science Security as a Social Science 3 4 7 7 8 9 11 14 15 15 15 16 16 16 17 17 18 19 20 20 21 21 21 22 23 Review Questions 23 Exercises 24 24 Module 2 The Need for Information Security 27 Introduction To The Need For Information Security 28 Business Needs First 4.8 Billion Potential Hackers Other Studies of Threats Common Attack Pattern Enumeration and Classification (CAPEC) The 12 Categories Of Threats Compromises to Intellectual Property Deviations in Quality of Service Espionage or Trespass Forces of Nature Human Error or Failure Information Extortion Sabotage or Vandalism Software Attacks Technical Hardware Failures or Errors Technical Software Failures or Errors Technological Obsolescence Theft 30 30 31 33 34 34 37 39 47 49 54 56 58 66 67 72 73 Module Summary 74 Review Questions 75 Exercises 76 References 76 17 Module Summary References Information Security Threats And Attacks 29 Module 3 Information Security Management 81 Introduction To The
Management Of Information Security Planning Policy Programs Protection People Projects Information Security Planning And Governance 82 82 83 83 83 83 83 84 Information Security Leadership Information Security Governance Outcomes Planning Levels Planning and the CISO 84 86 87 87 Information Security Policy, Standards, And Practices 88 Policy as the Foundation for Planning Enterprise Information Security Policy Issue-Specific Security Policy Systems-Specific Security Policy (SysSP) 88 91 91 95
Table of Contents Developing and Implementing Effective Security Policy Policy Management Security Education, Training, And Awareness Program Security Education Security Training Security Awareness Managing Risk 97 103 104 105 106 106 Information Security Blueprint, Models, And Frameworks The ISO 27000 Series NIST Security Models Other Sources of Security Frameworks Design of the Security Architecture 107 107 109 113 113 Module Summary 118 Review Questions 118 Exercises 119 References 119 Feasibility and Cost-Benefit Analysis Alternative Risk Management Methodologies The OCTAVE Methods FAIR ISO Standards for InfoSec Risk Management NIST Risk Management Framework (RMF) Selecting the Best Risk Management Model Module Summary Review Questions Risk Management Introduction To Risk Management Sun Tzu and the Art of Risk Management The Risk Management Framework The Roles of the Communities of Interest The RM Policy Framework Design Defining the Organization s Risk Tolerance and Risk Appetite Framework Implementation Framework Monitoring and Review The Risk Management Process RM Process Preparation—Establishing the Context Risk Assessment: Risk Identification Risk Assessment: Risk Analysis Risk Evaluation Risk Treatment/Risk Response Risk Mitigation Risk Transference Risk Acceptance Risk Termination Process Communications, Monitoring, and Review Mitigation and Risk „.tv » — -TO՝ ,Հէ r o ,ր 4- ֊֊ 121 122 122 123 124 125 126 126 127 127 128 129 129 142 149 152 152 153 154 155 155 155 ЖИДИ 159 164 164 165 166 1661 169 I 1711 1721 Exercises 172 References 174 Module 5 Incident Response
and Contingency Planning Module 4 157 175 Introduction To Incident Response And Contingency Planning 176 Fundamentals Of Contingency Planning 177 Components of Contingency Planning Business Impact Analysis Contingency Planning Policies Incident Response Getting Started Incident Response Policy Incident Response Planning Detecting Incidents Reacting to Incidents Recovering from Incidents Digital Forensics The Digital Forensics Team Affidavits and Search Warrants Digital Forensics Methodology Evidentiary Procedures Disaster Recovery The Disaster Recovery Process Disaster Recovery Policy Disaster Classification Planning to Recover Responding to the Disaster 179 180 185 186 186 į 187 1 188 1 191 i 193 1 1951 200 I 2011 201 1 2011 206 1 206 1 207 І 208 I 209 1 2091 2111
vili и Principles of Information Security Business Continuity Ц Business Continuity Policy И ■ ■ Business Resumption Continuity Strategies Timing and Sequence of CP Elements ■ ■ В Crisis Management Testing Contingency Plans Final Thoughts on CP 212 213 213 214 215 217 217 218 gg Module Summary 219 ■ Review Questions 220 Exercises 221 References 221 Codes Of Ethics Of Professional Organizations Major IT and InfoSec Professional Organizations Key U.S. Federal Agencies Department of Homeland Security U.S. Secret Service Federal Bureau of Investigation (FBI) National Security Agency (NSA) 247 247 249 249 252 253 255 Module Summary 256 Review Questions 257 Exercises 257 References 258 Module 6 Legal, Ethical, and Professional Issues in Information Security Introduction To Law And Ethics In Information Security Organizational Liability and the Need for Counsel Policy Versus Law Types of Law Relevant U.S. Laws ■ ■ В И В И Μ ■ ■ В В И В ■ ■ ■ В В В И Я £?լ General Computer Crime Laws Privacy Identity Theft Export and Espionage Laws U.S. Copyright Law Financial Reporting Freedom of Information Act of 1966 Payment Card Industry Data Security Standards (PCI DSS) State and Local Regulations International Laws And Legal Bodies U.K. Computer Security Laws Australian Computer Security Laws Council of Europe Convention on Cybercrime World Trade Organization and the Agreement on Trade-Related Aspects of Intellectual Property Rights Digital Millennium Copyright Act Ethics And Information Security Ethical Differences Across Cultures Ethics and Education Deterring Unethical and Illegal
Behavior Module 7 223 224 224 225 225 226 226 227 234 236 237 237 238 238 239 240 240 240 240 241 241 242 243 244 246 Security and Personnel Introduction To Security And Personnel Positioning The Security Function Staffing The Information Security Function Qualifications and Requirements Entry into the Information Security Profession Information Security Positions Credentials For Information Security Professionals (ISC)2 Certifications ISACA Certifications SANS Certifications EC-Council Certifications CompTIA Certifications Cloud Security Certifications Certification Costs Advice for Information Security Professionals Employment Policies And Practices Job Descriptions Interviews Background Checks Employment Contracts New Hire Orientation On-the-job Security Training Evaluating Performance Termination 261 262 263 264 266 267 267 273 273 276 277 279 280 281 281 282 283 284 284 284 285 285 285 286 286 Jr
Table of Contents Personnel Control Strategies Privacy and the Security of Personnel Data Security Considerations for Temporary Employees, Consultants, and Other Workers 287 289 289 Module Summary 291 Review Questions 292 Exercises 293 References 293 Honeypots, Honeynets, And Padded Cell Systems Module 8 Security Technology: Access Controls, Firewalls, and VPNs 295 Introduction To Access Controls 296 Access Control Mechanisms Biometrics Access Control Architecture Models 298 301 304 Firewall Technologies 308 Firewall Processing Modes Firewall Architectures Selecting the Right Firewall Configuring and Managing Firewalls Content Filters 309 313 317 318 324 Protecting Remote Connections 325 Remote Access Virtual Private Networks (VPNs) 325 329 Final Thoughts On Remote Access And Access Controls 331 Deperimeterization Remote Access in the Age of COVID-19 331 332 Module Summary 333 Review Questions 333 Exercises 334 References 334 Module 9 Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools 337 Introduction To Intrusion Detection And Prevention Systems 338 IDPS Terminology Why Usean I DPS? 340 Types of IDPSs 342 IDPS Detection Methods 350 Log File Monitors 351 Security Information and Event Management (SIEM) 351 IDPS Response Behavior 354 Selecting IDPS Approaches and Products 356 Strengths and Limitations of IDPSs 360 Deployment and Implementation of an IDPS 361 Measuring the Effectiveness of IDPSs 365 339 Trap-and-Trace Systems Active Intrusion Prevention Scanning And Analysis Tools Port Scanners Firewall Analysis Tools Operating System
Detection Tools Vulnerability Scanners Packet Sniffers Wireless Security Tools 367 368 369 370 372 373 373 374 377 378 Module Summary 380 Review Questions 381 Exercises 381 References 381 Module 10 Cryptography Introduction To Cryptography The History of Cryptology Key Cryptology Terms 383 384 384 385 Encryption Methods 386 Substitution Cipher Transposition Cipher Exclusive OR Vernam Cipher Book-Based Ciphers Hash Functions 387 390 391 392 393 394 Cryptographic Algorithms Symmetric Encryption Asymmetric Encryption Encryption Key Size Cryptographic Tools Public Key Infrastructure (PKI) 396 396 397 398 400 400
Principles of Information Security Digital Signatures Digital Certificates Hybrid Cryptography Systems Steganography Protocols For Secure Communications Securing Internet Communication with HTTPS and SSL Securing E-Mail with S/MIME, PEM, and PGP Securing Web Transactions with SET, SSL, and HTTPS Securing Wireless Networks with WPA and RSN Securing TCP/IP with IPSec and PGP Module Summary 444 Review Questions 445 Exercises 446 405 References 446 405 406 Module 12 401 402 403 404 407 408 410 Module Summary 413 Review Questions 414 Exercises 415 References 415 Module 11 Implementing Information Security Introduction To Information Security Implementation The Systems Development Life Cycle Traditional Development Methods Software Assurance The NIST Approach to Securing the SDLC Information Security Project Management Developing the Project Plan Project Planning Considerations The Need for Project Management Security Project Management Certifications Technical Aspects Of Implementation Conversion Strategies The Bull s-Eye Model To Outsource or Not Technology Governance and Change Control The Center for Internet Security s Critical Security Controls Nontechnical Aspects Of Implementation The Culture of Change Management Considerations for Organizational Change 417 Information Security Maintenance Introduction To Information Security Maintenance Security Management Maintenance Models NIST SP 800-100, Information Security Handbook: A Guide for Managers” The Security Maintenance Model Monitoring the External Environment Monitoring the Internal Environment Planning and Risk
Assessment Vulnerability Assessment and Remediation Readiness and Review Physical Security 418 419 419 421 423 428 429 432 434 436 437 437 438 439 440 440 441 442 442 Physical Access Controls Physical Security Controls Fire Security and Safety Failure of Supporting Utilities and Structural Collapse Heating, Ventilation, and Air Conditioning Power Management and Conditioning Interception of Data Securing Mobile and Portable Systems Special Considerations for Physical Security 447 448 449 449 470 470 474 476 481 489 490 491 491 494 494 494 495 496 496 498 Module Summary 500 Review Questions 501 Exercises 502 References 502 Glossary 505 Index 527
|
any_adam_object | 1 |
author | Whitman, Michael E. 1964- Mattord, Herbert J. |
author_GND | (DE-588)173003621 (DE-588)1061152685 |
author_facet | Whitman, Michael E. 1964- Mattord, Herbert J. |
author_role | aut aut |
author_sort | Whitman, Michael E. 1964- |
author_variant | m e w me mew h j m hj hjm |
building | Verbundindex |
bvnumber | BV047406017 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1268181242 (DE-599)BVBBV047406017 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Seventh edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02735nam a2200505 c 4500</leader><controlfield tag="001">BV047406017</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210910 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">210809s2022 xx |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780357506431</subfield><subfield code="9">978-0-357-50643-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1268181242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047406017</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Whitman, Michael E.</subfield><subfield code="d">1964-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)173003621</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of information security</subfield><subfield code="c">Michael E. Whitman (Ph.D., CISM, CISSP), Herbert J. Mattord (Ph.D., CISM, CISSP)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Seventh edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Cengage</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 536 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11. Security and personnel -- 12. Information security maintenance</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by today's businesses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Redes de computadoras / Medidas de seguridad</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Seguridad informática</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tecnología de la información / Medidas de seguridad</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mattord, Herbert J.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1061152685</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032806998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032806998</subfield></datafield></record></collection> |
id | DE-604.BV047406017 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:18:38Z |
institution | BVB |
isbn | 9780357506431 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032806998 |
oclc_num | 1268181242 |
open_access_boolean | |
owner | DE-739 DE-898 DE-BY-UBR DE-20 |
owner_facet | DE-739 DE-898 DE-BY-UBR DE-20 |
physical | XX, 536 Seiten Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Cengage |
record_format | marc |
spellingShingle | Whitman, Michael E. 1964- Mattord, Herbert J. Principles of information security Computer networks / Security measures Computer security Information technology / Security measures Redes de computadoras / Medidas de seguridad Seguridad informática Tecnología de la información / Medidas de seguridad Databescherming gtt Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 |
title | Principles of information security |
title_auth | Principles of information security |
title_exact_search | Principles of information security |
title_full | Principles of information security Michael E. Whitman (Ph.D., CISM, CISSP), Herbert J. Mattord (Ph.D., CISM, CISSP) |
title_fullStr | Principles of information security Michael E. Whitman (Ph.D., CISM, CISSP), Herbert J. Mattord (Ph.D., CISM, CISSP) |
title_full_unstemmed | Principles of information security Michael E. Whitman (Ph.D., CISM, CISSP), Herbert J. Mattord (Ph.D., CISM, CISSP) |
title_short | Principles of information security |
title_sort | principles of information security |
topic | Computer networks / Security measures Computer security Information technology / Security measures Redes de computadoras / Medidas de seguridad Seguridad informática Tecnología de la información / Medidas de seguridad Databescherming gtt Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks / Security measures Computer security Information technology / Security measures Redes de computadoras / Medidas de seguridad Seguridad informática Tecnología de la información / Medidas de seguridad Databescherming Datensicherung Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032806998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT whitmanmichaele principlesofinformationsecurity AT mattordherbertj principlesofinformationsecurity |