Amazon cover image
Image from Amazon.com

Information security : principles and practices / Mark S. Merkow, Jim Breithaupt.

By: Contributor(s): Material type: TextSeries: Security series (Upper Saddle River, N.J.)Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006.Description: xxvii, 420 p. : ill. ; 24 cmISBN:
  • 0131547291
  • 9780131547292
Subject(s): LOC classification:
  • QA76.9.A25 M485
Contents:
Chapter 1: Why Study Information Security? Chapter 2: Information Security Principles of Success Chapter 3: Certification Programs and the Common Body of Knowledge Chapter 4: Security Management Chapter 5: Security Architecture and Models Chapter 6: Business Continuity Planning and Disaster Recovery Planning Chapter 7: Law, Investigations, and Ethics Chapter 8: Physical Security Control Chapter 9: Operations Security Chapter 10: Access Control Systems and Methodology Chapter 11: Cryptography Chapter 12: Telecommunications, Network, and Internet Security Chapter 13: Application Development Security Chapter 14: Securing the Future
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books Methodist University Library Main General Stacks QA76.9.A25 M485 (Browse shelf(Opens below)) Available 30929
Books Methodist University Library Main General Stacks Reference QA76.9.A25 M485 (Browse shelf(Opens below)) Available 23565

Browsing Methodist University Library Main shelves,Shelving location: General Stacks,Collection: Reference Close shelf browser (Hides shelf browser)

Includes index

Chapter 1: Why Study Information Security?
Chapter 2: Information Security Principles of Success
Chapter 3: Certification Programs and the Common Body of Knowledge
Chapter 4: Security Management
Chapter 5: Security Architecture and Models
Chapter 6: Business Continuity Planning and Disaster Recovery Planning
Chapter 7: Law, Investigations, and Ethics
Chapter 8: Physical Security Control
Chapter 9: Operations Security
Chapter 10: Access Control Systems and Methodology
Chapter 11: Cryptography
Chapter 12: Telecommunications, Network, and Internet Security
Chapter 13: Application Development Security
Chapter 14: Securing the Future

There are no comments on this title.

to post a comment.
Share
Copyright © 2026  MUG Library