๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

โœ Scribed by Jacobs, Stuart


Publisher
Wiley-IEEE Press
Year
2015
Tongue
English
Leaves
771
Series
IEEE Press series on information & communication networks security
Edition
2nd ed
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Content: Series Page
Title Page
Copyright
Dedication
Preface and Acknowledgments
About the Companion Website
Chapter 1: What is Security?
1.1 Introduction
1.2 The Subject of Security
1.3 A Twenty-First Century Tale
1.4 Why are You Important to Computer Security?
1.5 End of the Beginning
1.6 Chapter Summary
1.7 Further Reading and Resources
Chapter 2: Systems Engineering
2.1 So What is Systems Engineering?
2.2 Process Management
2.3 Organization Environments
2.4 Chapter Summary
2.5 Further Reading and Resources
Chapter 3: Foundation Concepts
3.1 Security Concepts and Goals 3.2 Role Of Cryptography In Information Security3.3 Key Management Revisited
3.4 Chapter Summary
3.5 Further Reading and Resources
Chapter 4: Authentication of Subjects
4.1 Authentication Systems
4.2 Human Authentication
4.3 Chapter Summary
4.4 Further Reading and Resources
Chapter 5: Security Systems Engineering
5.1 Security Policy Development
5.2 Senior Management Oversight and Involvement
5.3 Security Process Management and Standards
5.4 Information Security Systems Engineering Methodology
5.5 Requirements Analysis and Decomposition
5.6 Access Control Concepts 5.7 Security Modeling and Security-Related Standards5.8 Chapter Summary
Chapter 6: Traditional Network Concepts
6.1 Networking Architectures
6.2 Types of Networks
6.3 Network Protocols
6.4 Chapter Summary
6.5 Further Reading and Resources
Chapter 7: Next-Generation Networks
7.1 Framework and Topology of the Ngn
7.2 The Ngn Functional Reference Model
7.3 Relationship Between Ngn Transport and Service Domains
7.4 Enterprise Role Model
7.5 Security Allocation Within the Ngn Transport Stratum Example
7.6 Converged Network Management (TMN and eTOM) 7.7 General Network Security Architectures7.8 Chapter Summary
7.9 Further Reading and Resources
Chapter 8: General Computer Security Architecture
8.1 The Hardware Protects the Software
8.2 The Software Protects Information
8.3 Element Security Architecture Description
8.4 Operating System (OS) Structure
8.5 Security Mechanisms for Deployed Operating Systems (OSs)
8.6 Chapter Summary
8.7 Further Reading and Resources
Chapter 9: Computer Software Security
9.1 Specific Operating Systems (OSs)
9.2 Applications
9.3 Chapter Summary
9.4 Further Reading and Resources Chapter 10: Security Systems Design-Designing Network Security10.1 Introduction
10.2 Security Design for Protocol Layer 1
10.3 Layer 2-Data Link Security Mechanisms
10.4 Security Design for Protocol Layer 3
10.5 IP Packet Authorization and Access Control
10.6 Chapter Summary
10.7 Further Reading and Resources
Chapter 11: Transport and Application Security Design and Use
11.1 Layer 4-Transport Security Protocols
11.2 Layer 5-User Service Application Protocols
11.3 Chapter Summary
11.4 Further Reading and Resources
Chapter 12: Securing Management and Managing Security


๐Ÿ“œ SIMILAR VOLUMES


Engineering Information Security: The Ap
โœ Stuart Jacobs ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› John Wiley & Sons ๐ŸŒ English

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of pr

Engineering Information Security: The Ap
โœ Stuart Jacobs ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of pr

A practical guide to security engineerin
โœ Debra S. Herrmann ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Auerbach Publications ๐ŸŒ English

โ€ข Examines the impact of both accidental and malicious, intentional action and inaction โ€ข Defines the five major components of a comprehensive and effective program โ€ข Introduces the concept of IA integrity levels and provides a complete methodology for information security/IA throughout the life o

Semantic Technologies for Business and I
โœ Stefan Smolnik ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› IGI Global ๐ŸŒ English

There are increasing opportunities to consider the application of semantic technologies for business information systems. Semantic technologies are expected to improve business processes and information systems, and lead to savings in cost and time as well as improved efficiency.Semantic Technologie