Free Shipping Worldwide | Members get 10% extra.


Shipping & Delivery

Shipping Rates can ship to virtually any address in the world. Please check on this page for more information on costs and delivery times. Interested in free shipping? Learn about our FREE Shipping .

Shipping Method Delivery Estimate First Item Charge Each Aditional Item
Free! Standard 6-16 Days Free for order above $30 Free for order above $30
Standard 6-16 Days $ 7.00 $ 5.00
Trackable Expedited 4-6 Days $ 12.00 $ 8.00
Trackable Express 2-3 Days $ 30.00 $ 25.00

When my order will arrive?

It really depends on the item -- you can see the relevant info on its page. You'll get a email when your item has been shipped. can ship to virtually any address in the world. Once your order has been shipped, we offer the following times for delivery in business days (Mon-Fri):

Australia and New Zealand 7-12 business days
Middle East and Gulf 7-12 business days
Singapore & Hong Kong 7-10 business days
United Kingdom 7-10 business days
Europe 7-12 business days
USA and Canada 7-15 business days
South America 7-18 business days
All other countries 7-15 business days

Information Security and Technology

Authors (s): B.M. Ponnappa (Author)
Format: Hardcover
ISBN-10: 8170491789
Pages: 447p., Figures; Tables; Appendix; Index; 23cm.
Pub. date: 01.01.2004, 1st ed.
Publisher: Manas Publications
Language (s): English
Bagchee ID: BB18188
List price: US $ 36,00
Bagchee price: US $ 32,40
You save: (10.00%)
Member price: US $ 29,16 info

Overview for Information Security and Technology

Almost every identifiable unity of human environment-be it an individual, a national or even the space that surrounds it-has some important, vital or expensive asset (s) or characteristic (s) that need to be protected, kept safe and secured. The assets could be solid and physical like life and limbs of persons and people, properties and installations etc., or abstract ones such as software, intellectual property, networks, some encashable resources or even just personal space or an environmental characteristic. Ensuring safety and security of such assets is a natural, widespread and necessary requirement. But, trustworthy security is achieved and maintained only with deliberate design and not by haphazard approach. Advent of fast changing technology complicates the issue-technology having made rapid inroads into safety and security systems in the past century (and continues to do so). Technology may be even as the mainstay for sophisticated trustworthy security systems for truly complicated security scenarios. The book is aimed to provide a window and insight into the use of technology in safety and security systems in the present situation. It not only spells out the general approach, principles and guidelines to good security design but also details the basic principles of security management, in regard to all types of security scenarios that involve “ Personal/VIP Security” and the all inclusive mega problems of “Operations Process Security”.
Write your own review
  • There are no reviews yet. Be the first to write one