𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information security: principles and practices

✍ Scribed by Breithaupt, Jim;Merkow, Mark S


Publisher
Pearson
Year
2014
Tongue
English
Leaves
369
Series
Pearson certification/training series
Edition
2nd edition
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Planning and Disaster Recovery Planning -- Chapter 7: Law, Investigations, and Ethics -- Chapter 8: Physical Security Control -- Chapter 9: Operations Security -- Chapter 10: Access Control Systems and Methodology -- Chapter 11: Cryptography -- Chapter 12: Telecommunications, Network, and Internet Security -- Chapter 13: Software Development Security -- Chapter 14: Securing the Future -- Appendices.

✦ Table of Contents


Chapter 1: Why Study Information Security? --
Chapter 2: Information Security Principles of Success --
Chapter 3: Certification Programs and the Common Body of Knowledge --
Chapter 4: Governance and Risk Management --
Chapter 5: Security Architecture and Design --
Chapter 6: Business Continuity Planning and Disaster Recovery Planning --
Chapter 7: Law, Investigations, and Ethics --
Chapter 8: Physical Security Control --
Chapter 9: Operations Security --
Chapter 10: Access Control Systems and Methodology --
Chapter 11: Cryptography --
Chapter 12: Telecommunications, Network, and Internet Security --
Chapter 13: Software Development Security --
Chapter 14: Securing the Future --
Appendices.

✦ Subjects


Computer networks--Security measures;Computer security;Data protection;Information technology--Security measures;Internet--Security measures;Computer networks -- Security measures;Internet -- Security measures;Information technology -- Security measures


πŸ“œ SIMILAR VOLUMES


Information Security : Principles and Pr
✍ Mark Stamp πŸ“‚ Library πŸ“… 2005 🌐 English

Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus

Information security: principles and pra
✍ Breithaupt, Jim;Merkow, Mark S πŸ“‚ Library πŸ“… 2014 πŸ› Pearson Education Limited (US titles) 🌐 English

Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan

Information Security Principles and Prac
✍ Mark Stamp πŸ“‚ Library πŸ“… 2005 πŸ› Wiley-Interscience 🌐 English

Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus

Information Security Principles and Pra
✍ Mark Stamp πŸ“‚ Library πŸ“… 2011 πŸ› Wiley 🌐 English

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most curren

Information Security: Principles and Pra
✍ Mark Stamp(auth.) πŸ“‚ Library πŸ“… 2011 🌐 English

<b>Now updatedβ€”your expert guide to twenty-first century information security</b><p> Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentialit