Free Downloads
Information Assurance Handbook: Effective Computer Security And Risk Management Strategies

Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems. Chapter-ending critical thinking exercises reinforce the material covered. An extensive list of scholarly works and international government standards is also provided in this detailed guide. Comprehensive coverage includes: Basic information assurance principles and concepts Information assurance management system Current practices, regulations, and plans Impact of organizational structure Asset management Risk management and mitigation Human resource assurance Advantages of certification, accreditation, and assurance Information assurance in system development and acquisition Physical and environmental security controls Information assurance awareness, training, and education Access control Information security monitoring tools and methods Information assurance measurements and metrics Incident handling and computer forensics Business continuity management Backup and restoration Cloud computing and outsourcing strategies Information assurance big data concerns

File Size: 20572 KB

Print Length: 480 pages

Publisher: McGraw-Hill Education; 1 edition (September 12, 2014)

Publication Date: September 12, 2014

Sold by:  Digital Services LLC

Language: English


Text-to-Speech: Enabled

X-Ray: Not Enabled

Word Wise: Not Enabled

Lending: Not Enabled

Enhanced Typesetting: Not Enabled

Best Sellers Rank: #628,346 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #213 in Books > Computers & Technology > Security & Encryption > Encryption #222 in Books > Computers & Technology > Security & Encryption > Cryptography #584 in Books > Computers & Technology > Security & Encryption > Privacy & Online Safety

Schou, Corey, and Steven Hernandez. Information Assurance Handbook - Effective Computer Security and Risk Management. New York: McGraw Hill Education, 2015.This is a well-conceived and well-executed reference for both business/government leaders, computer security, information assurance (IA) professionals who want a timely review and critical discussion of the range of threats and IA principles/methods to meet the challenges to today’s IT systems.The book offers some practical frameworks and methodologies for approaching both legacy and emerging information technologies such as data-mining, cloud-based, client/server applications, all toward the focus of achieving and sustaining competitive advantage. This book is exemplary about in the dual focus on both (1) organizational leaders and (2) IT operations/assurance professionals, both of whom have information assurance concerns. The book offers a range of grounded examples and thought-provoking case discussions with well-framed questions to stimulate critical thought among business leaders and IA professionals.This diversity of reader audiences is a profound strength of this particular work. It is one of these information assurance books that belongs on your professional book-stand, in order to serve as a ready reference for the thoughtful application of information assurance; principles, frameworks and controls to meet our dynamic IT security challenges. The book’s appendices are both rigorous in substance and useful for a review of terms that are in use, in dealing in a present set of common IA threats, supported by a dynamic glossary and electronic citation for further IA references.

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies Fundamentals Of Information Systems Security (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance) Laboratory Manual To Accompany Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance Series) Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) ISO/IEC 27002:2005, Information technology - Security techniques - Code of practice for information security management (Redesignation of ISO/IEC 17799:2005) Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance) Hacking: Beginner's Guide to Computer Hacking, Basic Security, Penetration Testing (Hacking, How to Hack, Penetration Testing, Basic security, Computer Hacking) The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk Effective Leadership and Management in Nursing (8th Edition) (Effective Leadership & Management in Nursing (Sull) Effective Leadership and Management in Nursing (Effective Leadership & Management in Nursing (Sull) HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Management of Health Information: Functions & Applications (A volume in the Delmar Health Information Management Series) Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts Implementing Information Security in Healthcare: Building a Security Program (HIMSS Book Series) Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) Practical UNIX and Internet Security (Computer Security)