A multidisciplinary introduction to information security / (Record no. 22166)

LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011039831
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781420085907 (hardback)
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 005.8
MAIN ENTRY--PERSONAL NAME
Authors Mjolsnes, Stig F.
TITLE STATEMENT
Title A multidisciplinary introduction to information security /
Statement of responsibility, etc Stig F. Mjølsnes.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton :
Publisher CRC Press,
Date c2012.
PHYSICAL DESCRIPTION
Extent xxv, 322 p. :
Other Details ill. ;
Size 25 cm.
SERIES STATEMENT
Series statement Discrete mathematics and its applications
SUMMARY
Summary The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer security.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer networks
General Security measures.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computers
General Access control.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Multidisciplinary design optimization.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading COMPUTERS / Computer Engineering.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading COMPUTERS / Networking / General.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading TECHNOLOGY & ENGINEERING / Electrical.
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8
Public note Location Map
MAIN ENTRY--PERSONAL NAME
-- 38714
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 641
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2602
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 12819
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 38715
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 30876
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 36508
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 14172
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2013-11-26 AMAUK 005.8 MJ MU T0049554 2017-01-26 53.43 2017-01-26 REGULAR

Powered by Koha