|
|
|
|
LEADER |
02866nam a2200469 a 4500 |
001 |
29832 |
003 |
IGIG |
005 |
20100727175123.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
100714s2008 paua fsb 001 0 eng d |
010 |
# |
# |
|z 2007007405
|
020 |
# |
# |
|a 9781599043814 (ebook)
|
020 |
# |
# |
|z 1605667803 (hardcover)
|
020 |
# |
# |
|z 9781599043791 (hardcover)
|
020 |
# |
# |
|z 9781616927264 (pbk.)
|
024 |
7 |
# |
|a 10.4018/978-1-59904-379-1
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00542294
|
035 |
# |
# |
|a (OCoLC)707611644
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HV6773
|b .K59 2008e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
# |
|a Kizza, Joseph Migga.
|
245 |
1 |
0 |
|a Securing the information infrastructure
|c Joseph M. Kizza, Florence M. Kizza.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2008.
|
300 |
# |
# |
|a electronic texts (xiv, 368 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references and index.
|
505 |
0 |
# |
|a 1. Building trust in the information infrastructure -- 2. Need for morality and ethics -- 3. Building an ethical framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk -- 6. Network basics and securing the network infrastructure -- 7.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and authorization -- 11. Perimeter defense; the firewall -- 12. Intrusion detection and prevention systems -- 13. Security in wireless systems -- 14. Biometrics for access control -- 15. Digital evidence and computer crime -- 16. Digital crime investigation and forensics -- 17. Trends in information assurance.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on July 14, 2010).
|
650 |
# |
0 |
|a Cyberterrorism.
|
650 |
# |
0 |
|a Internet
|x Security measures.
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Information superhighway
|x Security measures.
|
700 |
1 |
# |
|a Kizza, Florence Migga.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2007007405
|z 9781599043791
|z 1605667803
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1
|z View fulltext via EzAccess
|