000 02256cam a2200385 i 4500
001 19237550
003 CSPC
005 20250717114931.0
008 160819s2018 mau b 001 0 eng
010 _a 2016038356
020 _a9781284116458
_qpbk.
035 _a19237550
040 _aDLC
_beng
_cDLC
_erda
_dDLC
_dCSPC
042 _apcc
050 0 0 _aQA76.9.A25
_bK536 2018
082 0 0 _a005.8
_bK560f
_223
100 1 _aKim, David
_c(Information technology security consultant),
_eauthor.
245 1 0 _aFundamentals of information systems security /
_cDavid Kim and Michael G. Solomon.
250 _aThird edition.
264 1 _aBurlington, Massachusetts :
_bJones & Bartlett Learning,
_c2018.
300 _axxii, 548 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aPart I. The need for information security -- Information systems security -- The internet of things is changing how we live -- Malicious attacks, threats, and vulnerabilities -- The drivers of the information security business -- Part II. Securing today's information systems -- Access controls -- Security operations and administrations -- Auditing, testing, and monitoring -- Risk, response, and recovery -- Cryptography -- Networks and telecommunications -- Malicious code and activity -- Part III. Information security standards, education, certifications, and laws -- Information security standards -- Information systems security education and training -- Information security professional certifications -- U.S. compliance laws.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInformation storage and retrieval systems
_xSecurity measures.
700 1 _aSolomon, Michael
_q(Michael G.),
_d1963-
_eauthor.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_e23
_h005.8
_iK560f
_kCIR
_m2018
_n0
999 _c12313
_d12313