Amazon cover image
Image from Amazon.com

Fundamentals of information systems security / David Kim, Michael G. Solomon.

By: Contributor(s): Material type: TextTextSeries: Jones & Bartlett Learning information systems security & assurance seriesPublisher: Burlington, MA : Jones & Bartlett Learning, 2018Edition: Third editionDescription: xxii, 548 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781284116458
Subject(s): DDC classification:
  • 005.8 KI.F 2018 23
LOC classification:
  • QA76.9.A25 K536 2018
Contents:
Preface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3.Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5.Access controls -- 6.Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9.Cryptography --10.Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III.Information Security Standards, Education, Certifications, and Laws : --12.Information Security Standards -- 13.Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15.U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index.
Summary: "Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Computing 005.8 KI.F 2018 (Browse shelf(Opens below)) Available 190448

Includes bibliographical references (pages 522-526) and index.

Preface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3.Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5.Access controls -- 6.Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9.Cryptography --10.Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III.Information Security Standards, Education, Certifications, and Laws : --12.Information Security Standards -- 13.Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15.U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index.

"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website.

There are no comments on this title.

to post a comment.