The information security dictionary : defining the terms that define security for E-business, Internet, information, and wireless technology
โ Scribed by Urs E Gattiker
- Publisher
- Kluwer Academic Publishers
- Year
- 2004
- Tongue
- English
- Leaves
- 444
- Series
- Kluwer international series in engineering and computer science, SECS 767
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Cover......Page 1
Contents......Page 8
List of Figures......Page 10
List of Tables......Page 12
Preface......Page 16
Acknowledgements......Page 20
Why is IT Security Important......Page 24
About This Dictionary......Page 28
About The Author......Page 30
How to Use This Dictionary......Page 32
Epilogue: Critical Infrastructure Protection (CIP)......Page 409
Appendices......Page 414
Suggestions for Additional Resources......Page 416
Appendix 1 On-Line Databases for Vulnerabilities and Security......Page 417
Appendix 2 Dictionaries & Encyclopedias......Page 419
Appendix 3 Miscellaneous Resources......Page 421
Appendix 4 Legislation and Regulation โ European Union......Page 425
Appendix 5 Legislation and Regulation......Page 429
Section A......Page 431
Section B......Page 433
Appendix 7 'Nearly' or Outright Free Security Tools for System Administrators......Page 436
Appendix 8 'Nearly' or Outright Free Security Tools for Home Users......Page 438
Appendix 9 Newsletters......Page 440
Appendix 10 Alerts and Advisories......Page 443
๐ SIMILAR VOLUMES
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objec
The Information Security Dictionary provides complete and easy to read explanations of common security and infrastructure protection terms. Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, in