Principles of information security. / Michael E. Whitman and Herbert J. Mattord.
Material type: TextPublisher: Australia : Thomson, 2005Edition: 2nd edDescription: xxiii, 576 p. : ill. ; 23 cmISBN: 9780619216252 0619216255Subject(s): Computer security -- Information technology | Security measuresLOC classification: TK5105.59.W54Item type | Current location | Home library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | TK5105.59.W54 (Browse shelf) | 1 | Available | 5752/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | TK5105.59.W541 (Browse shelf) | 2 | Available | 5753/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | TK5105.59.W542 (Browse shelf) | 3 | Available | 5754/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | TK5105.59.W543 (Browse shelf) | 4 | Available | 5755/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | TK5105.59.W544 (Browse shelf) | 5 | Available | 5756/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | TK5105.59.W545 (Browse shelf) | 6 | Available | 5757/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | TK5105.59.W546 (Browse shelf) | 7 | Available | 5758/12 |
Includes index.
Contents: Introduction to information security -- The Need for security -- Legal, ethical, and professional issues in information security -- Risk management --Planning for security -- Security technology: firewalls and VPNs -- Security technology: intrusion detection, access control, and other security tools -- Cryptography -- Physical security -- Implementing information security -- Security and personnel -- Information security maintenance.
There are no comments on this title.