Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

Fundamentals of information systems security / David Kim and Michael G. Solomon.

By: Contributor(s): Material type: TextTextPublisher: Burlington, Massachusetts : Jones & Bartlett Learning, 2018Edition: Third editionDescription: xxii, 548 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781284116458
Subject(s): DDC classification:
  • 005.8 K560f 23
LOC classification:
  • QA76.9.A25 K536 2018
Contents:
Part I. The need for information security -- Information systems security -- The internet of things is changing how we live -- Malicious attacks, threats, and vulnerabilities -- The drivers of the information security business -- Part II. Securing today's information systems -- Access controls -- Security operations and administrations -- Auditing, testing, and monitoring -- Risk, response, and recovery -- Cryptography -- Networks and telecommunications -- Malicious code and activity -- Part III. Information security standards, education, certifications, and laws -- Information security standards -- Information systems security education and training -- Information security professional certifications -- U.S. compliance laws.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Circulation Section CIR 005.8 K560f 2018 (Browse shelf(Opens below)) 1-2 Available 024464
Books Books Main Library Circulation Section CIR 005.8 K560f 2018 (Browse shelf(Opens below)) 2-2 Available 029783

Includes bibliographical references and index.

Part I. The need for information security -- Information systems security -- The internet of things is changing how we live -- Malicious attacks, threats, and vulnerabilities -- The drivers of the information security business -- Part II. Securing today's information systems -- Access controls -- Security operations and administrations -- Auditing, testing, and monitoring -- Risk, response, and recovery -- Cryptography -- Networks and telecommunications -- Malicious code and activity -- Part III. Information security standards, education, certifications, and laws -- Information security standards -- Information systems security education and training -- Information security professional certifications -- U.S. compliance laws.

There are no comments on this title.

to post a comment.