Principles of Information Security
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable. Students can feel confident that they are using a standards-based, content-driven resource to prepare for their work in the field.
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Wat mensen zeggen - Een review schrijven
We hebben geen reviews gevonden op de gebruikelijke plaatsen.
Introduction to Information Security
The Need for Security
Legal Ethical and Professional Issues in Information Security
Planning for Security
Security Technology Firewalls and VPNs
Security Technology Intrusion Detection and Prevention Systems and Other Security Tools
Overige edities - Alles weergeven
2011 Cengage Learning access control activities administrators algorithm analysis application areas attack authentication certification Chapter cipher ciphertext CISSP components computer security configuration copied Copyright 2011 Cengage Course Technology/Cengage Learning cryptography decrypt designed devices document Due to electronic duplicated e-mail eBook and/or eChapter(s electronic rights employees encryption example Figure filtering firewall functions hacker hardware identify IDPS IDPSs implementation individual information assets information security information security program information system Internet intrusion detection monitoring NIST Online operations organization organization’s organization’s information organizational packet password perform phase physical security plaintext procedures protect protocol requires Rights Reserved risk assessment risk management router scanned security controls security management security policy security professionals server Source specific standards strategy substitution cipher suppressed Systems Security technical testing third party content threats tion users vulnerability whole wireless