000 03383cam a2200409 i 4500
001 43948
003 0000000000
005 20240411193125.0
008 160819s2018 mau s 000 0 eng
010 _a2016038356
019 _a947147119
_a964289513
020 _a128411645X
_q(pbk.)
020 _a9781284116458
_q(pbk.)
035 _a(OCoLC)957077730
035 _a(OCoLC)957077730
_z(OCoLC)947147119
_z(OCoLC)964289513
040 _aDLC
_beng
_erda
_cDLC
_dYDXCP
_dBTCTA
_dNBU
_dYDX
_dOCLCQ
_dZ5A
_dI8M
_dOCLCA
_dOCLCQ
_dOCLCA
_dOCLCF
_dOCLCQ
_dCIN
042 _apcc
050 0 0 _aQA76.9.A25
_bK536 2018
082 0 0 _a005.8
_223
100 1 _aKim, David
_c(Information technology security consultant),
_eauthor
245 1 0 _aFundamentals of information systems security /
_cDavid Kim, Michael G. Solomon
250 _a3rd edition
264 1 _aBurlington, MA :
_bJones & Bartlett Learning,
_c2018
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
490 1 _aISSA, Information systems security & assurance series
504 _aIncludes bibliographical references (pages 522-526) and index
505 0 0 _tPreface --
_tAcknowledgements --
_tThe authors --
_gPart I.
_tThe Need for Information Security : --
_g1.
_tInformation Systems Security --
_g2.
_tThe Internet of Things is Changing How We Live --
_g3.
_tMalicious Attacks, Threats, and Vulnerabilities --
_g4.
_tThe Drivers of the Information Security Business --
_gPart II.
_tSecuring Today's Information Systems : --
_g5.
_tAccess controls --
_g6.
_tSecurity Operations and Administration --
_g7.
_tAuditing, Testing, and Monitoring --
_g8.
_tRisk, Response, and Recovery --
_g9.
_tCryptography --
_g10.
_tNetworks and Telecommunications --
_g11.
_tMalicious Code and Activity --
_gPart III.
_tInformation Security Standards, Education, Certifications, and Laws : --
_g12.
_tInformation Security Standards --
_g13.
_tInformation Systems Security Education and Training --
_g14.
_tInformation Security Professional Certifications --
_g15.
_tU.S. Compliance Laws --
_tAppendix A. Answer key --
_tAppendix B. Standard acronyms --
_tAppendix C. Earning the CompTIA security + certification --
_tGlossary of key terms --
_tReferences --
_tIndex
520 _a"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website
650 0 _aComputer security
650 0 _aInformation resources
_xSecurity measures
700 1 _aSolomon, Michael
_q(Michael G.),
_d1963-
_eauthor
830 0 _aJones & Bartlett Learning information systems security & assurance series
856 _uhttps://drive.google.com/file/d/1dqvYvSVPqvwJR6lxq8nTbi9sZiN_nNeS/view?usp=sharing
999 _c13611
_d13611