| 000 | 03062nam a22003974a 4500 | ||
|---|---|---|---|
| 005 | 20250918162035.0 | ||
| 007 | co |g||||||||| | ||
| 008 | 120515s2011 njua 001 0 eng | ||
| 010 | _a2010-028408 | ||
| 020 | _a9780470565124 (hbk) | ||
| 020 | _a0470565128 (hbk) | ||
| 039 | 9 |
_a201209101524 _bbaiti _c201209101520 _dbaiti _c201207121518 _didah _c201205151801 _didah _y05-15-2012 _zidah |
|
| 090 | _aQA76.9.A25J337 3 | ||
| 090 |
_aQA76.9.A25 _bJ337 |
||
| 100 | 1 | _aJacobs, Stuart. | |
| 245 | 1 | 0 |
_aEngineering information security : _bthe application of systems engineering concepts to achieve information assurance / _cStuart Jacobs. |
| 260 |
_aHoboken, N.J. : _bWiley _cc2011. |
||
| 300 |
_axxv, 700 p. : _bill. ; _c24 cm. + _e1 CD-ROM (4 3/4 in.). |
||
| 490 | 1 | _aIEEE Press series on information & communication networks security | |
| 500 | _aIncludes index. | ||
| 500 | _a'Book is accompanied by one computer optical disc entitle' Engineering information security : the application of systems engineering concepts to achieve information assurance' bearing the same call number and available at Bahagian Koleksi Media. | ||
| 520 | _a'Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society.'--Provided by publisher. | ||
| 520 | _a'This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society'--Provided by publisher. | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aInformation technology _xSecurity measures. |
|
| 650 | 0 | _aData protection. | |
| 830 | 0 | _aIEEE Press series on information & communication networks security. | |
| 907 |
_a.b15363545 _b2019-11-12 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kQA76.9.A25J337 3 |
||
| 914 | _avtls003500783 | ||
| 990 | _abaiti | ||
| 991 | _aFakulti Kejuruteraan dan Alam Bina | ||
| 998 |
_al _b2012-02-05 _cm _da _feng _gnju _y0 _z.b15363545 |
||
| 999 |
_c520062 _d520062 |
||