000 03062nam a22003974a 4500
005 20250918162035.0
007 co |g|||||||||
008 120515s2011 njua 001 0 eng
010 _a2010-028408
020 _a9780470565124 (hbk)
020 _a0470565128 (hbk)
039 9 _a201209101524
_bbaiti
_c201209101520
_dbaiti
_c201207121518
_didah
_c201205151801
_didah
_y05-15-2012
_zidah
090 _aQA76.9.A25J337 3
090 _aQA76.9.A25
_bJ337
100 1 _aJacobs, Stuart.
245 1 0 _aEngineering information security :
_bthe application of systems engineering concepts to achieve information assurance /
_cStuart Jacobs.
260 _aHoboken, N.J. :
_bWiley
_cc2011.
300 _axxv, 700 p. :
_bill. ;
_c24 cm. +
_e1 CD-ROM (4 3/4 in.).
490 1 _aIEEE Press series on information & communication networks security
500 _aIncludes index.
500 _a'Book is accompanied by one computer optical disc entitle' Engineering information security : the application of systems engineering concepts to achieve information assurance' bearing the same call number and available at Bahagian Koleksi Media.
520 _a'Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society.'--Provided by publisher.
520 _a'This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society'--Provided by publisher.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInformation technology
_xSecurity measures.
650 0 _aData protection.
830 0 _aIEEE Press series on information & communication networks security.
907 _a.b15363545
_b2019-11-12
_c2019-11-12
942 _c01
_n0
_kQA76.9.A25J337 3
914 _avtls003500783
990 _abaiti
991 _aFakulti Kejuruteraan dan Alam Bina
998 _al
_b2012-02-05
_cm
_da
_feng
_gnju
_y0
_z.b15363545
999 _c520062
_d520062