The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology / Edition 1by Urs E. Gattiker
Pub. Date: 12/14/2011
Publisher: Springer US
The Information Security Dictionary provides complete and easy to read explanations of common security and infrastructure protection terms. Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing.
This essential reference tool presents cutting-edge information on the most recent terms in use, in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology, and other disciplines, The Information Security Dictionary will be a valuable addition to the library of any IT professional and IT student.
The Information Security Dictionary is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering, and information sciences.
- Springer US
- Publication date:
- Springer International Series in Engineering and Computer Science , #767
- Edition description:
- Softcover reprint of the original 1st ed. 2004
- Product dimensions:
- 6.69(w) x 9.61(h) x 0.90(d)
Table of Contents
List of Figures.- List of Tables.- Preface: Something for Everyone.- Acknowledgements.- Why is IT Security Important?- About this Dictionary.- About the Author.- How to Use This Dictionary.- Epilogue: Critical Infrastructure Protection (CIP).- Appendices: Suggestions for Additional Resources.- Appendix 1: On-Line Databases for Vulnerabilities and Security.- Appendix 2: Dictionaries and Encyclopedias.- Appendix 3: Miscellaneous Resources.- Appendix 4: Legislation and Regulation - European Union.- Appendix 5: Legislation and Regulation.- Appendix 6: Standards and Best Practice.- Security and Utility Tools.- Appendix 7: 'Nearly' or Outright Free Security Tools for System Administrators.- Appendix 8: 'Nearly' or Outright Free Security Tools for Home Users.- Awareness Raising - Skill Development.- Appendix 9: Newsletters.- Appendix 10: Alerts and Advisories.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >