Introduction to information security a strategic-based approach

"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strate...

Full description

Saved in:
Bibliographic Details
Main Author: Shimeall, Timothy
Format: Book
Language:English
Published: Amsterdam ; Boston Syngress, an imprint of Elsevier 2014.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 100723
003 MY-KLNDU
005 20241220025545.0
008 141013s2014 ne a bi 000 0 eng d
020 |a 9781597499699 (pbk) 
020 |a 1597499692 (pbk) 
039 9 |a 201504091131  |b zul  |c 201411171220  |d shahrim  |c 201411171220  |d shahrim  |y 201410132054  |z syarifuddin 
040 |a UPNM 
090 |a TK 5102.85  |b .S53 2014 
100 1 |a Shimeall, Timothy 
245 1 0 |a Introduction to information security  |b a strategic-based approach  |c Timothy J. Shimeall, Jonathan M. Spring. 
260 |a Amsterdam ;  |a Boston  |b Syngress, an imprint of Elsevier  |c 2014. 
300 |a xxi, 360 p.  |b ill.  |c 24 cm. 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1 Motivation and Security Definitions -- Chapter 2 Strategies and Security -- Part 1 Deception -- Chapter 3 Deception Strategies: Networks, Organization, and Structures -- Chapter 4 Deception Strategies: Defensive Technologies -- Part 2 Frustration -- Chapter 5 Frustration Strategies: Technical Controls -- Chapter 6 Frustration Strategies: Formal Verification -- Part 3 Resistance -- Chapter 7 Resistance Strategies: Authentication and Permissions -- Chapter 8 Resistance Strategies: Symmetric Encryption -- Chapter 9 Resistance Strategies: Partitioning and Need to Know -- Chapter 10 Change Management -- Part 4 Recognition/Recovery -- Chapter 11 Network Analysis and Forensics -- Chapter 12 Recognition Strategies: Intrusion Detection and Prevention -- Chapter 13 Digital Forensics -- Chapter 14 Recognition Strategies: Integrity Detection -- Chapter 15 Recovery of Security -- Chapter 16 Professional Certifications and Overall Conclusions 
520 |a "The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- 
592 |a 00013726  |b 04/11/2014  |c RM299.80  |h PVK 
650 0 |a Telecommunication  |x security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
999 |a vtls000052960  |c 100723  |d 100723