๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information Assurance: Surviving in the Information Environment

โœ Scribed by Andrew Blyth PhD, MSc, Gerald L. Kovacich D.Crim, MSc, MA (auth.)


Publisher
Springer London
Year
2001
Tongue
English
Leaves
334
Series
Computer Communications and Networks
Edition
1st Edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


I. An Introduction to Information Assurance: 1. What is Information Assurance?. 2. The World of Information. 3. The Theory of Risks. 4. The Information World of Crime . 5. IA Trust and Supply Chains. 6. Basic IA Concepts and Models.- II. IA in the World of Corporations: 7. The Corporate Security Officer. 8. Corporate Security Fuctions. 9. IA in the Interest of National Security. 10. The Corporate IA Officer. 11. IA Organisational Functions.- III. Technical Aspects of IA: 12. IA and Software. 13. Applying Cryptography to IA. 14. Information Technology Security.- IV. The Future: 15. The Future and Final Thoughts. Appendix: References and Recommended Readings.- Appendix 2: UK Computer Misuse Act of 1990.- Appendix 3: "Computer Misuse Act 1990 - Loopholes and Anomalies".- Appendix 4: US Computer Security Act of 1987.- Appendix 5: BS7799.- Appendix 6: MIS Training Institute "Swiss Army Knife"Bibliography.- Index.

โœฆ Table of Contents


Front Matter....Pages i-xvii
Front Matter....Pages 1-1
What is Information Assurance?....Pages 3-16
The World of Information....Pages 17-29
The Theory of Risks....Pages 31-50
The Information World of Crime....Pages 51-71
IA Trust and Supply Chains....Pages 73-86
Basic IA Concepts and Models....Pages 87-106
Front Matter....Pages 107-107
The Corporate Security Officer....Pages 109-115
Corporate Security Functions....Pages 117-128
IA in the Interest of National Security....Pages 129-140
The Corporate IA Officer....Pages 141-149
IA Organisational Functions....Pages 151-171
Front Matter....Pages 173-173
IA and Software....Pages 175-195
Applying Cryptography to IA....Pages 197-205
IA Technology Security....Pages 207-218
Front Matter....Pages 219-219
The Future, Conclusions and Comments....Pages 221-227
Back Matter....Pages 229-337

โœฆ Subjects


Information Storage and Retrieval; Information Systems Applications (incl. Internet); Management of Computing and Information Systems; Computer Communication Networks; Data Encryption


๐Ÿ“œ SIMILAR VOLUMES


Information Assurance: Security in the I
โœ Andrew Blyth BSc, MSc, PhD, Gerald L. Kovacich MA, MSc, D.Crim (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer-Verlag London ๐ŸŒ English

<p><P>This<EM> updated</EM> edition of<EM> Information Assurance: Security in the Information Environment</EM> was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets.</P><P></P>

Information assurance: security in the i
โœ Andrew Blyth, Gerald L. Kovacich ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer ๐ŸŒ English

This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, inform

Information Assurance: Security in the I
โœ Andrew Blyth ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer ๐ŸŒ English

<span>When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations t