Fundamentals of information systems security / David Kim, Michael G. Solomon
Material type: TextSeries: Jones & Bartlett Learning information systems security & assurance seriesPublisher: Burlington, MA : Jones & Bartlett Learning, 2018Edition: 3rd editionContent type:- text
- computer
- online resource
- 128411645X
- 9781284116458
- 005.8 23
- QA76.9.A25 K536 2018
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
E-Resources | Main Library E-Resources | 005.8 K49 (Browse shelf(Opens below)) | Available | E003720 |
Includes bibliographical references (pages 522-526) and index
Preface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3. Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5. Access controls -- 6. Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9. Cryptography -- 10. Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III. Information Security Standards, Education, Certifications, and Laws : -- 12. Information Security Standards -- 13. Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15. U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index
"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website
There are no comments on this title.