000 | 03383cam a2200409 i 4500 | ||
---|---|---|---|
001 | 43948 | ||
003 | 0000000000 | ||
005 | 20240411193125.0 | ||
008 | 160819s2018 mau s 000 0 eng | ||
010 | _a2016038356 | ||
019 |
_a947147119 _a964289513 |
||
020 |
_a128411645X _q(pbk.) |
||
020 |
_a9781284116458 _q(pbk.) |
||
035 | _a(OCoLC)957077730 | ||
035 |
_a(OCoLC)957077730 _z(OCoLC)947147119 _z(OCoLC)964289513 |
||
040 |
_aDLC _beng _erda _cDLC _dYDXCP _dBTCTA _dNBU _dYDX _dOCLCQ _dZ5A _dI8M _dOCLCA _dOCLCQ _dOCLCA _dOCLCF _dOCLCQ _dCIN |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bK536 2018 |
082 | 0 | 0 |
_a005.8 _223 |
100 | 1 |
_aKim, David _c(Information technology security consultant), _eauthor |
|
245 | 1 | 0 |
_aFundamentals of information systems security / _cDavid Kim, Michael G. Solomon |
250 | _a3rd edition | ||
264 | 1 |
_aBurlington, MA : _bJones & Bartlett Learning, _c2018 |
|
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 | _aISSA, Information systems security & assurance series | |
504 | _aIncludes bibliographical references (pages 522-526) and index | ||
505 | 0 | 0 |
_tPreface -- _tAcknowledgements -- _tThe authors -- _gPart I. _tThe Need for Information Security : -- _g1. _tInformation Systems Security -- _g2. _tThe Internet of Things is Changing How We Live -- _g3. _tMalicious Attacks, Threats, and Vulnerabilities -- _g4. _tThe Drivers of the Information Security Business -- _gPart II. _tSecuring Today's Information Systems : -- _g5. _tAccess controls -- _g6. _tSecurity Operations and Administration -- _g7. _tAuditing, Testing, and Monitoring -- _g8. _tRisk, Response, and Recovery -- _g9. _tCryptography -- _g10. _tNetworks and Telecommunications -- _g11. _tMalicious Code and Activity -- _gPart III. _tInformation Security Standards, Education, Certifications, and Laws : -- _g12. _tInformation Security Standards -- _g13. _tInformation Systems Security Education and Training -- _g14. _tInformation Security Professional Certifications -- _g15. _tU.S. Compliance Laws -- _tAppendix A. Answer key -- _tAppendix B. Standard acronyms -- _tAppendix C. Earning the CompTIA security + certification -- _tGlossary of key terms -- _tReferences -- _tIndex |
520 | _a"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website | ||
650 | 0 | _aComputer security | |
650 | 0 |
_aInformation resources _xSecurity measures |
|
700 | 1 |
_aSolomon, Michael _q(Michael G.), _d1963- _eauthor |
|
830 | 0 | _aJones & Bartlett Learning information systems security & assurance series | |
856 | _uhttps://drive.google.com/file/d/1dqvYvSVPqvwJR6lxq8nTbi9sZiN_nNeS/view?usp=sharing | ||
999 |
_c13611 _d13611 |