Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
| AUTHOR | Mahboob, Athar; Zubairi, Junaid Ahmed; Mahboob, Athar et al. |
| PUBLISHER | Information Science Reference (08/31/2011) |
| PRODUCT TYPE | Hardcover (Hardcover) |
Description
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners, and consultants in the area of social media, cyber security and information, and communication technologies (ICT).
Show More
Product Format
Product Details
ISBN-13:
9781609608514
ISBN-10:
1609608518
Binding:
Hardback or Cased Book (Unsewn / Adhesive Bound)
Content Language:
English
More Product Details
Page Count:
338
Carton Quantity:
10
Product Dimensions:
8.60 x 1.00 x 11.00 inches
Weight:
2.40 pound(s)
Feature Codes:
Bibliography,
Index,
Table of Contents,
Illustrated
Country of Origin:
US
Subject Information
BISAC Categories
Computers | Security - Cryptography & Encryption
Computers | Security - Viruses & Malware
Dewey Decimal:
005.8
Library of Congress Control Number:
2011009262
Descriptions, Reviews, Etc.
publisher marketing
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners, and consultants in the area of social media, cyber security and information, and communication technologies (ICT).
Show More
List Price $195.00
Your Price
$193.05
