Limit this search to....

An Information Security Handbook 2001. Corr. 2nd Edition
Contributor(s): Hunter, John M. (Author)
ISBN: 1852331801     ISBN-13: 9781852331801
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback
Published: March 2001
Qty:
Annotation: Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.

Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Management Information Systems
- Business & Economics | Information Management
Dewey: 005.8
LCCN: 00066154
Series: Computer Communications and Networks
Physical Information: 0.64" H x 6.17" W x 9.25" (0.80 lbs) 226 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.