Image from Google Jackets

Information security management handbook

By: Contributor(s): Material type: TextTextPublication details: Boca Raton, Fla. Auerbach/Taylor & Francis 2007.Edition: 6th edDescription: xlvi, 3231 pages : illustrations ; 27 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780849374951
Subject(s): DDC classification:
  • 005.8 TIP 6
Online resources:
Contents:
1. Information security and risk management -- 2. Access control -- 3. Cryptography -- 4. Physical (environmental) security -- 5. Security architecture and design -- 6. Business continuity planning and disaster recovery planning -- 7. Telecommunications and networks security -- 8. Application security -- 9. Operations security -- 10. Law, compliance and investigations.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Botho University Lesotho Open Shelves Information Technology 005.8 TIP (Browse shelf(Opens below)) 1 Available BK000859
Books Books Botho University Lesotho Open Shelves Information Technology 005.8 TIP (Browse shelf(Opens below)) 2 Available BK000828
Books Books Botho University Lesotho Open Shelves Information Technology 005.8 TIP (Browse shelf(Opens below)) 3 Available BK000823
Books Books Botho University Lesotho Open Shelves Information Technology 005.8 TIP (Browse shelf(Opens below)) 4 Available BK000827
Books Books Botho University Lesotho Open Shelves Information Technology 005.8 TIP (Browse shelf(Opens below)) 5 Available BK000822
Books Books Botho University Lesotho Open Shelves Information Technology 005.8 TIP (Browse shelf(Opens below)) 6 Available BK000825
Books Books Botho University Lesotho Open Shelves Information Technology 005.8 TIP (Browse shelf(Opens below)) 7 Available BK000824

Includes index, glossary

Includes bibliographical references and index.

1. Information security and risk management -- 2. Access control -- 3. Cryptography -- 4. Physical (environmental) security -- 5. Security architecture and design -- 6. Business continuity planning and disaster recovery planning -- 7. Telecommunications and networks security -- 8. Application security -- 9. Operations security -- 10. Law, compliance and investigations.

English

There are no comments on this title.

to post a comment.

Powered by Koha