Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus
Information security: principles and practices
β Scribed by Breithaupt, Jim;Merkow, Mark S
- Publisher
- Pearson
- Year
- 2014
- Tongue
- English
- Leaves
- 369
- Series
- Pearson certification/training series
- Edition
- 2nd edition
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Planning and Disaster Recovery Planning -- Chapter 7: Law, Investigations, and Ethics -- Chapter 8: Physical Security Control -- Chapter 9: Operations Security -- Chapter 10: Access Control Systems and Methodology -- Chapter 11: Cryptography -- Chapter 12: Telecommunications, Network, and Internet Security -- Chapter 13: Software Development Security -- Chapter 14: Securing the Future -- Appendices.
β¦ Table of Contents
Chapter 1: Why Study Information Security? --
Chapter 2: Information Security Principles of Success --
Chapter 3: Certification Programs and the Common Body of Knowledge --
Chapter 4: Governance and Risk Management --
Chapter 5: Security Architecture and Design --
Chapter 6: Business Continuity Planning and Disaster Recovery Planning --
Chapter 7: Law, Investigations, and Ethics --
Chapter 8: Physical Security Control --
Chapter 9: Operations Security --
Chapter 10: Access Control Systems and Methodology --
Chapter 11: Cryptography --
Chapter 12: Telecommunications, Network, and Internet Security --
Chapter 13: Software Development Security --
Chapter 14: Securing the Future --
Appendices.
β¦ Subjects
Computer networks--Security measures;Computer security;Data protection;Information technology--Security measures;Internet--Security measures;Computer networks -- Security measures;Internet -- Security measures;Information technology -- Security measures
π SIMILAR VOLUMES
Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan
Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most curren
<b>Now updatedβyour expert guide to twenty-first century information security</b><p> Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentialit