This book is geared at postgraduate courses on managing and designing information systems. It concentrates primarily on security in military systems and looks at the different goals organisations might have in employing security techniques and which techniques are best suited to acheiving certain goals. The book provides answers to questions such as What is security? and What are the security problems particular to an IT system? It is essential reading for students on final year undergraduate courses and MSc courses on Infomations Systems, Management of Information Systems, and Design of Information Systems. The text is up-to-date and includes implications which arose from the Y2K date change.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
EUR 4,66 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisEUR 9,70 expédition depuis Allemagne vers France
Destinations, frais et délaisVendeur : Phatpocket Limited, Waltham Abbey, HERTS, Royaume-Uni
Etat : Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. N° de réf. du vendeur Z1-Y-023-00599
Quantité disponible : 1 disponible(s)
Vendeur : CSG Onlinebuch GMBH, Darmstadt, Allemagne
Softcover. Etat : Gut. Gebraucht - Gut Zustand: Gut, Mängelexemplar, XIV, 226 p. About this book: Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions; What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications? It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation. Written for final year undergraduates; postgraduates (MSc); computer system managers; system administrators. N° de réf. du vendeur 17037
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Covers a more comprehensive range of subjects than other available texts (including management of security and personnel security)More up-to-date than other books, including implications which arose from the Y2K date changeThis book is geared at pos. N° de réf. du vendeur 4289395
Quantité disponible : Plus de 20 disponibles
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions: What is security What are the security problems particular to an IT system What can be done to reduce the security risks associated with such a system In a given situation, what are the appropriate security countermeasures How should one set about procuring an information system with security implications It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, 'An Information Security Handbook' will be of interest to computer system managers and administrators in any commercial or government organisation. 244 pp. Englisch. N° de réf. du vendeur 9781852331801
Quantité disponible : 2 disponible(s)
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9781852331801_new
Quantité disponible : Plus de 20 disponibles
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;What is security What are the security problems particular to an IT system What can be done to reduce the security risks associated with such a system In a given situation, what are the appropriate security countermeasures How should one set about procuring an information system with security implications It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation. N° de réf. du vendeur 9781852331801
Quantité disponible : 1 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. Neuware -Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;What is security What are the security problems particular to an IT system What can be done to reduce the security risks associated with such a system In a given situation, what are the appropriate security countermeasures How should one set about procuring an information system with security implications It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 244 pp. Englisch. N° de réf. du vendeur 9781852331801
Quantité disponible : 2 disponible(s)
Vendeur : Midtown Scholar Bookstore, Harrisburg, PA, Etats-Unis
Paperback. Etat : Very Good. Very Good paperback with light shelfwear - NICE! Standard-sized. N° de réf. du vendeur mon0000098744
Quantité disponible : 1 disponible(s)
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 378. N° de réf. du vendeur C9781852331801
Quantité disponible : Plus de 20 disponibles
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
Etat : New. N° de réf. du vendeur ABLIING23Mar2912160256501
Quantité disponible : Plus de 20 disponibles