Introduction to information security a strategic-based approach
"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strate...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam ; Boston
Syngress, an imprint of Elsevier
2014.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 100723 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025545.0 | ||
| 008 | 141013s2014 ne a bi 000 0 eng d | ||
| 020 | |a 9781597499699 (pbk) | ||
| 020 | |a 1597499692 (pbk) | ||
| 039 | 9 | |a 201504091131 |b zul |c 201411171220 |d shahrim |c 201411171220 |d shahrim |y 201410132054 |z syarifuddin | |
| 040 | |a UPNM | ||
| 090 | |a TK 5102.85 |b .S53 2014 | ||
| 100 | 1 | |a Shimeall, Timothy | |
| 245 | 1 | 0 | |a Introduction to information security |b a strategic-based approach |c Timothy J. Shimeall, Jonathan M. Spring. |
| 260 | |a Amsterdam ; |a Boston |b Syngress, an imprint of Elsevier |c 2014. | ||
| 300 | |a xxi, 360 p. |b ill. |c 24 cm. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Chapter 1 Motivation and Security Definitions -- Chapter 2 Strategies and Security -- Part 1 Deception -- Chapter 3 Deception Strategies: Networks, Organization, and Structures -- Chapter 4 Deception Strategies: Defensive Technologies -- Part 2 Frustration -- Chapter 5 Frustration Strategies: Technical Controls -- Chapter 6 Frustration Strategies: Formal Verification -- Part 3 Resistance -- Chapter 7 Resistance Strategies: Authentication and Permissions -- Chapter 8 Resistance Strategies: Symmetric Encryption -- Chapter 9 Resistance Strategies: Partitioning and Need to Know -- Chapter 10 Change Management -- Part 4 Recognition/Recovery -- Chapter 11 Network Analysis and Forensics -- Chapter 12 Recognition Strategies: Intrusion Detection and Prevention -- Chapter 13 Digital Forensics -- Chapter 14 Recognition Strategies: Integrity Detection -- Chapter 15 Recovery of Security -- Chapter 16 Professional Certifications and Overall Conclusions | |
| 520 | |a "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM299.80 |h PVK | ||
| 650 | 0 | |a Telecommunication |x security measures. | |
| 650 | 0 | |a Computer networks |x Security measures. | |
| 650 | 0 | |a Computer security. | |
| 999 | |a vtls000052960 |c 100723 |d 100723 | ||


