000 03065cam a22003614a 4500
001 17021712
005 20140924165541.0
008 111026s2011 flua b 001 0 eng
010 _a 2011039831
020 _a9781420085907
040 _aDLC
_cDLC
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bM845 2012
082 0 0 _a005.8
_223
_bMJO-M
084 _aCOM059000
_aCOM043000
_aTEC007000
_2bisacsh
100 _aMjolsnes, Stig F.
245 0 2 _aA multidisciplinary introduction to information security
_c[edited by] Stig F. Mjolsnes.
260 _aBoca Raton :
_bCRC Press,
_cc2012.
300 _axxv, 322 p. :
_bill. ;
_c25 cm.
490 0 _aDiscrete mathematics and its applications
504 _aIncludes bibliographical references and index.
520 _a"Preface The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management"--
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputers
_xAccess control.
650 0 _aMultidisciplinary design optimization.
650 7 _aCOMPUTERS / Computer Engineering.
_2bisacsh
650 7 _aCOMPUTERS / Networking / General.
_2bisacsh
650 7 _aTECHNOLOGY & ENGINEERING / Electrical.
_2bisacsh
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c7439
_d7439