Welcome to UE Central Library

Keep Smiling

Information security management handbook / Harold F. Tipton, Micki Krause, [editors].

Contributor(s): Material type: TextTextPublication details: Boca Raton : Auerbach Publications, 2010Edition: 6th edDescription: v. <2-7> : ill. ; 24-26 cmISBN:
  • 9780849374951
  • 9781420067088 (v. 2 : hardcover : alk. paper)
  • 1420067087 (v. 2 : hardcover : alk. paper)
  • 9781420090925 (v. 3 : hardcover)
  • 9781439819029 (v. 4 : hardcover)
  • 9781439853450 (v. 5 : hardcover : acidfree paper)
  • 9781439893135 (v. 6 : hardback : acidfree paper)
  • 9781466567498 (v. 7 : hardback : acidfree paper)
Subject(s): DDC classification:
  • 005.8 22 H292
Contents:
Front cover; Contents; Preface; Editors; Domain 1: ACCESS CONTROL; Body; Chapter 1: Back to the Future; Domain 2: TELECOMMUNICATIONS AND NETWORK SECURITY; Chapter 2: Adaptive Threats and Defenses; Chapter 3: Achieving a Global Information Systems Transformation (GIST):Foundations for Infrastructure2.0 via Standards-BasedInteroperability:IF-MAP and Beyond; Chapter 4: A Primer on Demystifying U.S. Government Networks; Network Attacks andCountermeasures; Chapter 5: Antispam: Bayesian Filtering; Domain 3: INFORMATION SECURITY AND RISKMANAGEMENT.
List(s) this item appears in: Computer | Computer_2022
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books UE-Central Library 005.8 H292 (Browse shelf(Opens below)) Available T9872

Front cover; Contents; Preface; Editors; Domain 1: ACCESS CONTROL; Body; Chapter 1: Back to the Future; Domain 2: TELECOMMUNICATIONS AND NETWORK SECURITY; Chapter 2: Adaptive Threats and Defenses; Chapter 3: Achieving a Global Information Systems Transformation (GIST):Foundations for Infrastructure2.0 via Standards-BasedInteroperability:IF-MAP and Beyond; Chapter 4: A Primer on Demystifying U.S. Government Networks; Network Attacks andCountermeasures; Chapter 5: Antispam: Bayesian Filtering; Domain 3: INFORMATION SECURITY AND RISKMANAGEMENT.

There are no comments on this title.

to post a comment.
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk