|
![]() |
|||
|
||||
OverviewThe Information Security Dictionary provides complete and easy to read explanations of common security and infrastructure protection terms. Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing. This essential reference tool presents cutting-edge information on the most recent terms in use, in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology, and other disciplines, The Information Security Dictionary will be a valuable addition to the library of any IT professional and IT student. The Information Security Dictionary is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering, and information sciences. Full Product DetailsAuthor: Urs E. GattikerPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of the original 1st ed. 2004 Volume: 767 Dimensions: Width: 15.50cm , Height: 2.20cm , Length: 23.50cm Weight: 0.759kg ISBN: 9781441954473ISBN 10: 1441954473 Pages: 411 Publication Date: 14 December 2011 Audience: Professional and scholarly , College/higher education , Professional and scholarly , Professional & Vocational , Tertiary & Higher Education Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsList of Figures.- List of Tables.- Preface: Something for Everyone.- Acknowledgements.- Why is IT Security Important?- About this Dictionary.- About the Author.- How to Use This Dictionary.- Epilogue: Critical Infrastructure Protection (CIP).- Appendices: Suggestions for Additional Resources.- Appendix 1: On-Line Databases for Vulnerabilities and Security.- Appendix 2: Dictionaries and Encyclopedias.- Appendix 3: Miscellaneous Resources.- Appendix 4: Legislation and Regulation - European Union.- Appendix 5: Legislation and Regulation.- Appendix 6: Standards and Best Practice.- Security and Utility Tools.- Appendix 7: `Nearly' or Outright Free Security Tools for System Administrators.- Appendix 8: `Nearly' or Outright Free Security Tools for Home Users.- Awareness Raising - Skill Development.- Appendix 9: Newsletters.- Appendix 10: Alerts and Advisories.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |