Principles of information security / Michael E. Whitman.
Material type: TextPublication details: Australia : Thomson Course Technology, c2005.Edition: 2nd edDescription: xxiii, 576 p. : ill. ; 24 cmISBN:- 9780619216252
- TK5105.59 .W45 2005
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - Pioneer General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.3 | Available | Z004888 | ||
Books | Zetech Library - Pioneer General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.2 | Available | Z004887 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | Available | Z006445 | |||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.9 | Available | Z006550 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.4 | Available | Z005347 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.5 | Available | Z005348 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.6 | Available | Z005350 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.7 | Available | Z005349 | ||
Books | Zetech Library - TRC General Stacks | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.8 | Available | Z005367 | |||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .W45 2005 (Browse shelf(Opens below)) | C.1 | Available | Z004886 |
Includes index.
Introduction to information security -- The need for security -- Legal, ethical and professional issues in information security --Risk management -- Planning for security -- Security technology: firewalls and VPNs -- Security technology: Intrusion detection access control and other security tools -- Cryptography -- Physical security -- Implementing information security -- Security and personnel -- Information security maintenance.
There are no comments on this title.