logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

An Information Security Handbook 1st Edition John M D Hunter Ba Hons

  • SKU: BELL-4198936
An Information Security Handbook 1st Edition John M D Hunter Ba Hons
$ 31.00 $ 45.00 (-31%)

5.0

78 reviews

An Information Security Handbook 1st Edition John M D Hunter Ba Hons instant download after payment.

Publisher: Springer-Verlag London
File Extension: PDF
File size: 9.87 MB
Pages: 226
Author: John M. D. Hunter BA (Hons), FBCS, CEng (auth.)
ISBN: 9781447102618, 9781852331801, 1447102614, 1852331801
Language: English
Year: 2001
Edition: 1

Product desciption

An Information Security Handbook 1st Edition John M D Hunter Ba Hons by John M. D. Hunter Ba (hons), Fbcs, Ceng (auth.) 9781447102618, 9781852331801, 1447102614, 1852331801 instant download after payment.

Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.

Related Products