Amazon cover image
Image from Amazon.com
Image from Google Jackets

Information security : principles and practices / Mark S. Merkow, Jim Breithaupt.

By: Contributor(s): Material type: TextTextSeries: Security series (Upper Saddle River, N.J.)Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006.Description: xxvii, 420 p. : ill. ; 24 cmISBN:
  • 9780131547292
Subject(s): DDC classification:
  • 005.8   22
Contents:
Why Study Information Security? -- Information Security Principles of Success -- Security Management -- Security Architecture and Models -- Business Continuity Planning and Disaster Recovery Planning -- Law, Investigations, and Ethics -- Physical Security Control -- Operations Security -- Access Control Systems and Methodology -- Cryptography -- Application -- Security for the Future Development Security Telecommunications, Network, and Internet Security -- Generating CD and Diskette Bootable Media -- Laboratory Setup and Hardware Requirements -- Security Management Practices: Key Areas of Knowledge -- HIPAA Security Rule Standards
Summary: This text has been developed to cover the 10 domains in the Information Security Common Body of Knowledge. They include: Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 005.8 / ME.I 2006 (Browse shelf(Opens below)) 1 Available 001347

Includes bibliographical references (p. 409-413) and index.

Why Study Information Security? -- Information Security Principles of Success -- Security Management -- Security Architecture and Models -- Business Continuity Planning and Disaster Recovery Planning -- Law, Investigations, and Ethics -- Physical Security Control -- Operations Security -- Access Control Systems and Methodology -- Cryptography -- Application -- Security for the Future Development Security Telecommunications, Network, and Internet Security -- Generating CD and Diskette Bootable Media -- Laboratory Setup and Hardware Requirements -- Security Management Practices: Key Areas of Knowledge -- HIPAA Security Rule Standards

This text has been developed to cover the 10 domains in the Information Security Common Body of Knowledge. They include: Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.

1

There are no comments on this title.

to post a comment.