"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not si
Information Security (Principles and Practice) || Introduction
โ Scribed by Stamp, Mark
- Publisher
- John Wiley & Sons, Inc.
- Year
- 2011
- Tongue
- English
- Weight
- 1017 KB
- Edition
- 2
- Category
- Article
- ISBN
- 0470626399
No coin nor oath required. For personal study only.
โฆ Synopsis
"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.
๐ SIMILAR VOLUMES
"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not si
## ARP cache ARP cache Figure A-6: ARP Cache Poisoning A-1.7 C o n c l u s i o n s In this section, we've barely scratched the surface of the vast topic that is networking. Tanenbaum [298] presents a good introduction to a wide range of networking topics, and his book is well suited to independen