Cyber security standards, practices and industrial applications:systems and methodologies

Saved in:
Bibliographic Details
Group Author: Zubairi Junaid Ahmed 1961-; Mahboob Athar 1971-
Published: Information Science Reference,
Publisher Address: Hershey, PA
Publication Dates: c2012.
Literature type: Book
Language: English
Subjects:
Carrier Form: xviii, 316 p.: ill. ; 29 cm.
ISBN: 9781609608514 (hbk.)
1609608518 (hbk.)
9781609608521 (ebook)
1609608526 (ebook)
9781609608538 (print & perpetual access)
1609608534 (print & perpetual access)
Index Number: TP393
CLC: TP393.08
Call Number: TP393.08/C994-1
Contents: "Premier reference source"--Cover.
Includes bibliographical references (p. 280-302) and index.
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.