The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology 2004 Edition Contributor(s): Gattiker, Urs E. (Author) |
|
ISBN: 1402078897 ISBN-13: 9781402078897 Publisher: Springer OUR PRICE: $142.49 Product Type: Hardcover - Other Formats Published: July 2004 Annotation: This book provides complete and easy-to-read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management, and applied fields that build on those. |
Additional Information |
BISAC Categories: - Computers | Security - Cryptography - Computers | Computer Science - Reference | Dictionaries |
Dewey: 005.803 |
LCCN: 2004042139 |
Series: Kluwer International Series in Engineering & Computer Science |
Physical Information: 1.15" H x 6.32" W x 9.54" (1.97 lbs) 411 pages |
Descriptions, Reviews, Etc. |
Publisher Description: Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection terms, without causing much damage to the usually slim student pocketbook. This dictionary can help non-specialistreaders better understand the infor- tion security issues encountered in their work or studying for their certification examination or whilst doing a practical assignment as part of a workshop. This book is also essential to a reference collection for an organization's system personnel. Special attention is paid to terms which most often prevent educated readers from understanding journal articles and books in cryptology, computing science, and information systems, in addition to applied fields that build on those disciplines, such as system design, security auditing, vulnera- lity testing, and role-based access management. The dictionary provides defi- tions that enable readers to get through a difficult article or passage. We do not, for the most part, directly explain how to conduct research or how to implement the terms briefly described. |