000 | 01695cam a2200313 i 4500 | ||
---|---|---|---|
001 | 17939871 | ||
003 | OSt | ||
005 | 20220527085226.0 | ||
008 | 131113s2014 ne a b 001 0 eng | ||
010 | _a 2013044944 | ||
020 | _a9781597499699 (pbk.) | ||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5102.85 _b.S53 2014 |
082 | 0 | 0 |
_a005.8 _223 |
100 | 1 |
_aShimeall, Timothy, _eauthor. |
|
245 | 1 | 0 |
_aIntroduction to information security : _ba strategic-based approach / _cTimothy J. Shimeall, Jonathan M. Spring. |
250 | _aFirst edition. | ||
300 |
_axxi, 360 pages : _billustrations ; _c24 cm |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _a"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- | ||
650 | 0 |
_aTelecommunication _xSecurity measures. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
700 | 1 |
_aSpring, Jonathan M., _eauthor. |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c9466 _d9466 |