Cyber security standards, practices and industrial applications :
General Material Designation
[Book]
Other Title Information
systems and methodologies /
First Statement of Responsibility
Junaid Ahmed Zubairi, Athar Mahboob.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Hershey, Pa. :
Name of Publisher, Distributor, etc.
Information Science Reference,
Date of Publication, Distribution, etc.
[2012]
Date of Publication, Distribution, etc.
c2012
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
xviii, 316 pages :
Other Physical Details
illustrations ;
Dimensions
29 cm
GENERAL NOTES
Text of Note
"Premier reference source"--P. [1] of cover.
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references (p. 280-302) and index.
SUMMARY OR ABSTRACT
Text of Note
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
TOPICAL NAME USED AS SUBJECT
Computer networks-- Security measures.
Computer security.
Data protection.
Electronic data processing departments-- Security measures.