File Size: 20572 KB
Print Length: 480 pages
Publisher: McGraw-Hill Education; 1 edition (September 12, 2014)
Publication Date: September 12, 2014
Sold by: Digital Services LLC
Language: English
ASIN: B00LI364GW
Text-to-Speech: Enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Not Enabled
Best Sellers Rank: #628,346 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #213 in Books > Computers & Technology > Security & Encryption > Encryption #222 in Books > Computers & Technology > Security & Encryption > Cryptography #584 in Books > Computers & Technology > Security & Encryption > Privacy & Online Safety
Schou, Corey, and Steven Hernandez. Information Assurance Handbook - Effective Computer Security and Risk Management. New York: McGraw Hill Education, 2015.This is a well-conceived and well-executed reference for both business/government leaders, computer security, information assurance (IA) professionals who want a timely review and critical discussion of the range of threats and IA principles/methods to meet the challenges to today’s IT systems.The book offers some practical frameworks and methodologies for approaching both legacy and emerging information technologies such as data-mining, cloud-based, client/server applications, all toward the focus of achieving and sustaining competitive advantage. This book is exemplary about in the dual focus on both (1) organizational leaders and (2) IT operations/assurance professionals, both of whom have information assurance concerns. The book offers a range of grounded examples and thought-provoking case discussions with well-framed questions to stimulate critical thought among business leaders and IA professionals.This diversity of reader audiences is a profound strength of this particular work. It is one of these information assurance books that belongs on your professional book-stand, in order to serve as a ready reference for the thoughtful application of information assurance; principles, frameworks and controls to meet our dynamic IT security challenges. The book’s appendices are both rigorous in substance and useful for a review of terms that are in use, in dealing in a present set of common IA threats, supported by a dynamic glossary and electronic citation for further IA references.
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies Fundamentals Of Information Systems Security (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance) Laboratory Manual To Accompany Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance Series) Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) ISO/IEC 27002:2005, Information technology - Security techniques - Code of practice for information security management (Redesignation of ISO/IEC 17799:2005) Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance) Hacking: Beginner's Guide to Computer Hacking, Basic Security, Penetration Testing (Hacking, How to Hack, Penetration Testing, Basic security, Computer Hacking) The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk Effective Leadership and Management in Nursing (8th Edition) (Effective Leadership & Management in Nursing (Sull) Effective Leadership and Management in Nursing (Effective Leadership & Management in Nursing (Sull) HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Management of Health Information: Functions & Applications (A volume in the Delmar Health Information Management Series) Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts Implementing Information Security in Healthcare: Building a Security Program (HIMSS Book Series) Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) Practical UNIX and Internet Security (Computer Security)