skip to content
Information security : principles and practices Preview this item
ClosePreview this item
Checking...

Information security : principles and practices

Author: Mark S Merkow; Jim Breithaupt
Publisher: Upper Saddle River, N.J. : Pearson Prentice Hall, ©2006.
Series: Security series (Upper Saddle River, N.J.)
Edition/Format:   Print book : EnglishView all editions and formats
Summary:

Useful for an introductory course in information security, this title presents principles and practices. It covers the 10 domains in the Information Security Common Body of Knowledge. They include:  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Merkow, Mark S.
Information security.
Upper Saddle River, N.J. : Pearson Prentice Hall, ©2006
(OCoLC)681737169
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Mark S Merkow; Jim Breithaupt
ISBN: 0131547291 9780131547292
OCLC Number: 60644730
Description: xxvii, 420 pages : illustrations ; 24 cm.
Contents: Threats and compliance --
Simply essential --
The SOHO internet highway Code --
The Infosec basics for business --
Essentials for smaller organizations --
Essentials for larger organizations --
Essentials for wireless networking --
Essentials for e-commerce --
Legal and regulatory essentials.
Series Title: Security series (Upper Saddle River, N.J.)
Responsibility: Mark S. Merkow, Jim Breithaupt.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(4)

User lists with this item (3)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/60644730<\/a>> # Information security : principles and practices<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"60644730<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nju<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Place\/upper_saddle_river_n_j<\/a>> ; # Upper Saddle River, N.J.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Topic\/securite_informatique<\/a>> ; # S\u00E9curit\u00E9 informatique<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872484<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Topic\/computersicherheit<\/a>> ; # Computersicherheit<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/117155342<\/a>> ; # Jim Breithaupt<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2006<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/77149073<\/a>> ; # Mark S. Merkow<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2006<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Threats and compliance -- Simply essential -- The SOHO internet highway Code -- The Infosec basics for business -- Essentials for smaller organizations -- Essentials for larger organizations -- Essentials for wireless networking -- Essentials for e-commerce -- Legal and regulatory essentials.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/314061869<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Series\/security_series_upper_saddle_river_n_j<\/a>> ; # Security series (Upper Saddle River, N.J.)<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Series\/security_series<\/a>> ; # Security series<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/681737169<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information security : principles and practices<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"60644730<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/60644730#PublicationEvent\/upper_saddle_river_n_j_pearson_prentice_hall_2006<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Agent\/pearson_prentice_hall<\/a>> ; # Pearson Prentice Hall<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catdir.loc.gov\/catdir\/toc\/ecip0514\/2005016854.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780131547292<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBA850399<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/60644730<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Agent\/pearson_prentice_hall<\/a>> # Pearson Prentice Hall<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Pearson Prentice Hall<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Place\/upper_saddle_river_n_j<\/a>> # Upper Saddle River, N.J.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Upper Saddle River, N.J.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Series\/security_series<\/a>> # Security series<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/60644730<\/a>> ; # Information security : principles and practices<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Security series<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Series\/security_series_upper_saddle_river_n_j<\/a>> # Security series (Upper Saddle River, N.J.)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/60644730<\/a>> ; # Information security : principles and practices<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Security series (Upper Saddle River, N.J.)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Topic\/computersicherheit<\/a>> # Computersicherheit<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computersicherheit<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Topic\/securite_informatique<\/a>> # S\u00E9curit\u00E9 informatique<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"S\u00E9curit\u00E9 informatique<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nju<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nju<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872484<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/117155342<\/a>> # Jim Breithaupt<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1955<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Breithaupt<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jim<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jim Breithaupt<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/77149073<\/a>> # Mark S. Merkow<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Merkow<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Mark S.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Mark S. Merkow<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780131547292<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0131547291<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780131547292<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/681737169<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Information security.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Online version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/60644730<\/a>> ; # Information security : principles and practices<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/60644730<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/60644730<\/a>> ; # Information security : principles and practices<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-12-24<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/60644730#PublicationEvent\/upper_saddle_river_n_j_pearson_prentice_hall_2006<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Place\/upper_saddle_river_n_j<\/a>> ; # Upper Saddle River, N.J.<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/314061869#Agent\/pearson_prentice_hall<\/a>> ; # Pearson Prentice Hall<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n