| 000 | 01663nam a2200313 a 4500 | ||
|---|---|---|---|
| 005 | 20250918153147.0 | ||
| 008 | 120414s2010 maua b 001 0 eng | ||
| 020 |
_a9781597495332 (pbk.) _cRM154.85 |
||
| 039 | 9 |
_a201207041649 _brosli _c201206202143 _dmazarita _y04-14-2012 _zmazarita |
|
| 040 |
_aDLC _cDLC _dDLC _dUKM |
||
| 090 | _aQA76.9.A25M356 3 | ||
| 090 |
_aQA76.9.A25 _bM356 |
||
| 245 | 0 | 0 |
_aManaging information security / _ceditor John R. Vacca. |
| 260 |
_aBurlington, MA : _bElsevier, _c2010. |
||
| 300 |
_axxiv, 296 p. : _bill. ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _anformation security essentials for IT managers: protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and James Harmening -- Information technology security management / Rahul Bhasker, Bhushan Kapoor -- Identity management / Jean-Marc Seigneur, Tewfiq El Maliki -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan, Linfeng Zhang -- Firewalls / Errin W. Fulp -- Penetration testing / Jay Bavisi -- What is vulnerability assessment? / Almantas Kakareka. | |
| 650 | 0 |
_aComputer security _xManagement. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aPenetration testing (Computer security) | |
| 700 | 1 | _aVacca, John R. | |
| 907 |
_a.b15326512 _b2021-05-28 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kQA76.9.A25M356 3 |
||
| 914 | _avtls003496771 | ||
| 990 | _ark4 | ||
| 991 | _aFakulti Teknologi dan Sains Maklumat | ||
| 998 |
_al _b2012-01-04 _cm _da _feng _gmau _y0 _z.b15326512 |
||
| 999 |
_c516483 _d516483 |
||