000 | 03117cam a2200397 i 4500 | ||
---|---|---|---|
999 |
_c369 _d369 |
||
001 | 19237550 | ||
005 | 20220207082435.0 | ||
008 | 160819s2018 maua b 001 0 eng | ||
010 | _a 2016038356 | ||
020 |
_a9781284116458 _qpaperback |
||
040 |
_aDLC _beng _cDLC _erda _dEG-CaTKH |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bK536 2018 |
082 | 0 | 0 |
_a005.8 KI.F 2018 _223 |
100 | 1 |
_aKim, David, _eauthor. |
|
245 | 1 | 0 |
_aFundamentals of information systems security / _cDavid Kim, Michael G. Solomon. |
250 | _aThird edition. | ||
264 | 1 |
_aBurlington, MA : _bJones & Bartlett Learning, _c2018. |
|
300 |
_axxii, 548 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
490 | 1 | _aISSA, Information systems security & assurance series | |
504 | _aIncludes bibliographical references (pages 522-526) and index. | ||
505 | 0 | _aPreface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3.Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5.Access controls -- 6.Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9.Cryptography --10.Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III.Information Security Standards, Education, Certifications, and Laws : --12.Information Security Standards -- 13.Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15.U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index. | |
520 | _a"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website. | ||
650 | 0 | _aComputer security. | |
650 | 0 |
_aInformation resources _xSecurity measures. |
|
700 | 1 |
_aSolomon, Michael, _d1963- _eauthor. |
|
830 | 0 | _aJones & Bartlett Learning information systems security & assurance series. | |
942 |
_2ddc _cBK |
||
998 |
_ahuda.mahmoud _bM _d2022026 |
||
998 |
_amona.romia _bR _d20220207 |
||
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |