Securing the information infrastructure

"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher.

Bibliographic Details
Main Author: Kizza, Joseph Migga.
Corporate Author: IGI Global.
Other Authors: Kizza, Florence Migga.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2008.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 02866nam a2200469 a 4500
001 29832
003 IGIG
005 20100727175123.0
006 m e d
007 cr bn||||m|||a
008 100714s2008 paua fsb 001 0 eng d
010 # # |z 2007007405 
020 # # |a 9781599043814 (ebook) 
020 # # |z 1605667803 (hardcover) 
020 # # |z 9781599043791 (hardcover) 
020 # # |z 9781616927264 (pbk.) 
024 7 # |a 10.4018/978-1-59904-379-1  |2 doi 
035 # # |a (CaBNVSL)gtp00542294 
035 # # |a (OCoLC)707611644 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HV6773  |b .K59 2008e 
082 0 4 |a 005.8  |2 22 
100 1 # |a Kizza, Joseph Migga. 
245 1 0 |a Securing the information infrastructure  |c Joseph M. Kizza, Florence M. Kizza.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2008. 
300 # # |a electronic texts (xiv, 368 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references and index. 
505 0 # |a 1. Building trust in the information infrastructure -- 2. Need for morality and ethics -- 3. Building an ethical framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk -- 6. Network basics and securing the network infrastructure -- 7.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and authorization -- 11. Perimeter defense; the firewall -- 12. Intrusion detection and prevention systems -- 13. Security in wireless systems -- 14. Biometrics for access control -- 15. Digital evidence and computer crime -- 16. Digital crime investigation and forensics -- 17. Trends in information assurance. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on July 14, 2010). 
650 # 0 |a Cyberterrorism. 
650 # 0 |a Internet  |x Security measures. 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Information superhighway  |x Security measures. 
700 1 # |a Kizza, Florence Migga. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2007007405  |z 9781599043791  |z 1605667803 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1  |z View fulltext via EzAccess