000 | 03940cam a22004097i 4500 | ||
---|---|---|---|
001 | 18653937 | ||
005 | 20191129160148.0 | ||
008 | 150611t20142014maua b 001 0 eng d | ||
010 | _a 2015295678 | ||
020 | _a9781284031621 | ||
035 | _a(OCoLC)ocn858876707 | ||
040 |
_aWAU _beng _dSCO _dYDXCP _dSGB _dOCLCQ _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bK536 2014 |
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aKim, David _c(Information technology security consultant) |
|
245 | 1 | 0 |
_aFundamentals of information systems security / _cDavid Kim and Michael G. Solomon. |
250 | _a2nd ed. | ||
264 | 1 |
_aBurlington, MA : _bJones & Bartlett Learning, _c[2014] |
|
264 | 4 | _c©2014 | |
300 |
_axxiv, 544 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
490 | 1 | _aJones & Bartlett Learning information systems security & assurance series | |
504 | _aIncludes bibliographical references (pages 519-522) and index. | ||
505 | 0 | _aPart one : The need for information security. Information systems security -- Changing how people and businesses communicate -- Malicious attacks, threats, and vulnerabilities -- The drivers of the information security business -- Part two : The Systems Security Certified Practitioner (SSCP) professional certification from (ISC)2. Access controls -- Security operations and administration -- Auditing, testing, and monitoring -- Risk, response, and recovery -- Cryptography -- Networks and telecommunications -- Malicious code and activity -- Part three : Information security standards, education, certifications, and laws. Information security standards -- Information systems security education and training -- Information security professional certifications -- U.S. compliance laws -- Appendixes. Answer key -- Standard acronyms -- Become a systems security certified practitioner (SSCP) -- Glossary of key terms -- References. | |
520 |
_aRevised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. New to the Second Edition: New material on cloud computing, risk analysis, IP mobility, OMNIBus, and Agile Software Development; Includes the most recent updates in Information Systems Security laws, certificates, standards, amendments, and the proposed Federal Information Security Amendments Act of 2013 and HITECH Act; Provides new cases and examples pulled from real-world scenarios; Updated data, tables, and sidebars provide the most current information in the field. - _cPublisher. |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aInformation resources _xSecurity measures. |
|
700 | 1 |
_aSolomon, Michael _q(Michael G.), _d1963- |
|
830 | 0 | _aJones & Bartlett Learning information systems security & assurance series. | |
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2udc _cBK |
||
999 |
_c919 _d919 |