Brand Waali Quality, Bazaar Waali Deal!
Our Blog
Help Center
Sell On Snapdeal
Download App
Cart
Sign In

Sorry! Cyber Security Standards, Practices and Industrial Applications is sold out.

Compare Products
Clear All
Let's Compare!

Cyber Security Standards, Practices and Industrial Applications

This product has been sold out

We will let you know when in stock
notify me

Featured

Highlights

  • ISBN13:9781609608514
  • ISBN10:1609608518
  • Publisher:Information Science Reference
  • Language:English
  • Author:Junaid Ahmed Zubairi and Athar Mahboob
  • Binding:Hardback
  • SUPC: SDL306646884

Description

Brief Description

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

Learn More about the Book

Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.