000 01695cam a2200313 i 4500
001 17939871
003 OSt
005 20220527085226.0
008 131113s2014 ne a b 001 0 eng
010 _a 2013044944
020 _a9781597499699 (pbk.)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aTK5102.85
_b.S53 2014
082 0 0 _a005.8
_223
100 1 _aShimeall, Timothy,
_eauthor.
245 1 0 _aIntroduction to information security :
_ba strategic-based approach /
_cTimothy J. Shimeall, Jonathan M. Spring.
250 _aFirst edition.
300 _axxi, 360 pages :
_billustrations ;
_c24 cm
504 _aIncludes bibliographical references and index.
520 _a"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"--
650 0 _aTelecommunication
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security.
700 1 _aSpring, Jonathan M.,
_eauthor.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c9466
_d9466