Amazon cover image
Image from Amazon.com

Fundamentals of information systems security / David Kim, Michael G. Solomon.

By: Contributor(s): Material type: TextTextSeries: Jones & Bartlett Learning information systems security & assurance seriesPublisher: Burlington, MA : Jones & Bartlett Learning, 2018Edition: Third editionDescription: xxii, 548 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781284116458
Subject(s): DDC classification:
  • 005.8 KI.F 2018 23
LOC classification:
  • QA76.9.A25 K536 2018
Contents:
Preface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3.Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5.Access controls -- 6.Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9.Cryptography --10.Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III.Information Security Standards, Education, Certifications, and Laws : --12.Information Security Standards -- 13.Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15.U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index.
Summary: "Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Books Books The Knowledge Hub Library Computing 005.8 KI.F 2018 (Browse shelf(Opens below)) Available 190448

Includes bibliographical references (pages 522-526) and index.

Preface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3.Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5.Access controls -- 6.Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9.Cryptography --10.Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III.Information Security Standards, Education, Certifications, and Laws : --12.Information Security Standards -- 13.Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15.U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index.

"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website.

There are no comments on this title.

to post a comment.
Design and Development by Asia