More From Contributor

£47.59
Constitutes the refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. This book

Includes::
the papers that are organized in topical sections on multimedia security, device security, HW implementation security, & network security.

...
Archived Product
£38.24
Key principles of information & communication security, including the latest research in critical areas of automatic speech recognition, such as speech watermarking, speech encryption & steganography are covered in detail in this important new volume. ...
Archived Product
£129.15
Computer security breaches are big headlines, & with talk of 'cyber-terrorism' the issue is now centre stage. This, the first truly comprehensive analysis of EU & US information security law, enables readers to assess how regulation relates to security. ...
Archived Product
£57.59
Updated annually, this handbook provides a compilation of the fundamental knowledge, skills, techniques, & tools required by all IT security professionals. It reflects the changes to the Common Body of Knowledge (CBK) in response to new technologies & new laws in different countries & regions. ...
Archived Product
£21.21
In a world that is demanding 24/7 availability of information & using increasingly complex types of technology, there are growing risks to information & its security. A compromise has to be struck between security of information & its availability. This book provides significant steps along the path of dealing with information security. ...
Archived Product
£44.19
Constitutes the refereed proceedings of the 5th International Information Security Practice & Experience Conference, ISPEC 2009, held in Xi'an, China in April 2009. This title

Includes::
papers that are organized in topical sections on public key encryption, digital signatures, system security, applied cryptography, &, hash functions & MACs.

...
Archived Product

Information Security Management

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. This title provides an overview of security auditing and examines the various elements of the information security life cycle.
RIP - This product is no longer available on our network. It was last seen on 01.01.2015

This page now acts as a permanent archive for this product. Add more information using the comments box below to ensure it can still be found by future generations.

Use our search facility to see if it is available from an alternative contributor.
  • Availability: Out Of Stock
  • Supplier: Pickabook
  • SKU: 9781420078541
Availability: In Stock
£44.99

Product Description

Information security cannot be effectively managed unless secure methods & standards are integrated into all phases of the information security life cycle. This title provides an overview of security auditing & examines the various elements of the information security life cycle.

Reviews/Comments

Add New

Intelligent Comparison

Oooops!
We couldn't find anything!
Perhaps this product's unique.... Or perhaps we are still looking for comparisons!
Click to bump this page and we'll hurry up.

Price History

Oooops!
We couldn't find any historical pricing!

Vouchers

No voucher codes found.
Do you know a voucher code for this product or supplier? Add it to Insights for others to use.

Facebook

Jargon Buster

Supplier Information

Pickabook
A UK based company founded in 1998. Offering exceptional value for money on a wide range of books including leather bound books and sticker books.

Over 5 million books in stock - all new
Discounts of upto 80 percent
Excellent customer service
Fast delivery
Page Updated: 2015-03-31 20:45:45

Community Generated Product Tags

Oh No! The productWIKI community hasn't generated any tags for this product yet!
Menu