000 03117cam a2200397 i 4500
999 _c369
_d369
001 19237550
005 20220207082435.0
008 160819s2018 maua b 001 0 eng
010 _a 2016038356
020 _a9781284116458
_qpaperback
040 _aDLC
_beng
_cDLC
_erda
_dEG-CaTKH
042 _apcc
050 0 0 _aQA76.9.A25
_bK536 2018
082 0 0 _a005.8 KI.F 2018
_223
100 1 _aKim, David,
_eauthor.
245 1 0 _aFundamentals of information systems security /
_cDavid Kim, Michael G. Solomon.
250 _aThird edition.
264 1 _aBurlington, MA :
_bJones & Bartlett Learning,
_c2018.
300 _axxii, 548 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 1 _aISSA, Information systems security & assurance series
504 _aIncludes bibliographical references (pages 522-526) and index.
505 0 _aPreface -- Acknowledgements -- The authors -- Part I. The Need for Information Security : -- 1. Information Systems Security -- 2. The Internet of Things is Changing How We Live -- 3.Malicious Attacks, Threats, and Vulnerabilities -- 4. The Drivers of the Information Security Business -- Part II. Securing Today's Information Systems : -- 5.Access controls -- 6.Security Operations and Administration -- 7. Auditing, Testing, and Monitoring -- 8. Risk, Response, and Recovery -- 9.Cryptography --10.Networks and Telecommunications -- 11. Malicious Code and Activity -- Part III.Information Security Standards, Education, Certifications, and Laws : --12.Information Security Standards -- 13.Information Systems Security Education and Training -- 14. Information Security Professional Certifications -- 15.U.S. Compliance Laws -- Appendix A. Answer key -- Appendix B. Standard acronyms -- Appendix C. Earning the CompTIA security + certification -- Glossary of key terms -- References -- Index.
520 _a"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website.
650 0 _aComputer security.
650 0 _aInformation resources
_xSecurity measures.
700 1 _aSolomon, Michael,
_d1963-
_eauthor.
830 0 _aJones & Bartlett Learning information systems security & assurance series.
942 _2ddc
_cBK
998 _ahuda.mahmoud
_bM
_d2022026
998 _amona.romia
_bR
_d20220207
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg