Information Security : Principles and Practices
Mark Merkow
Vendu par AHA-BUCH GmbH, Einbeck, Allemagne
Vendeur AbeBooks depuis 14 août 2006
Neuf(s) - Couverture souple
Etat : Neuf
Quantité disponible : 2 disponible(s)
Ajouter au panierVendu par AHA-BUCH GmbH, Einbeck, Allemagne
Vendeur AbeBooks depuis 14 août 2006
Etat : Neuf
Quantité disponible : 2 disponible(s)
Ajouter au panierNeuware - Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Written by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field. This edition addresses today's newest trends, from cloud and mobile security to BYOD and the latest compliance requirements. The authors present updated real-life case studies, review questions, and exercises throughout.
N° de réf. du vendeur 9780789753250
Information Security: Principles and Practices, Second Edition
Everything You Need to Know About Modern Computer Security, in One Book
Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)2 CBK].
Thoroughly updated for today's challenges, technologies, procedures, and best practices.
The perfect resource for anyone pursuing an IT security career.
Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge.
Two highly experienced security practitioners have brought together all the foundational knowledge you need to succeed in today's IT and business environments. They offer easy-to-understand, practical coverage of topics ranging from security management and physical security to cryptography and application development security.
This edition fully addresses new trends that are transforming security, from cloud services to mobile applications, "Bring Your Own Device" (BYOD) strategies to today's increasingly rigorous compliance requirements. Throughout, you'll find updated case studies, review questions, and exercises-all designed to reveal today's real-world IT security challenges and help you overcome them.
Learn how to
-- Recognize the evolving role of IT security
-- Identify the best new opportunities in the field
-- Discover today's core information security principles of success
-- Understand certification programs and the CBK
-- Master today's best practices for governance and risk management
-- Architect and design systems to maximize security
-- Plan for business continuity
-- Understand the legal, investigatory, and ethical requirements associated with IT security
-- Improve physical and operational security
-- Implement effective access control systems
-- Effectively utilize cryptography
-- Improve network and Internet security
-- Build more secure software
-- Define more effective security policies and standards
-- Preview the future of information security
Mark Merkow, CISSP, CISM, CSSLP, is a technical director for a Fortune 100 financial services firm, where he works on implementing and operating a software security practice for the enterprise. He has more than 35 years of IT experience, including 20 years in IT security. Mark has worked in a variety of roles, including applications development, systems analysis and design, security engineering, and security management. Mark holds a master's degree in decision and info systems from Arizona State University (ASU), a master's of education in Distance Learning from ASU, and a bachelor's degree in Computer Info Systems from ASU.
Jim Breithaupt is a data integrity manager for a major bank, where he manages risk for a large data mart. He has more than 30 years of data processing experience and has co-authored several other books on information systems and information security, along with Mark Merkow.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Visitez la page d’accueil du vendeur
Conditions générales et informations client
I. Conditions générales
§ 1 Dispositions de base
(1) Les conditions générales suivantes s?appliquent à tous les contrats que vous concluez avec nous en tant que fournisseur (AHA-BUCH GmbH) via les plateformes Internet AbeBooks et/ou ZVAB. Sauf accord contraire, l?inclusion de l?une de vos propres conditions générales que vous utilisez sera contestée
(2) Un consommateur au sens des règlements suivants est toute personne physique qui conclut une transact...
Pour plus d'informationNous expédions votre commande après les avoir reçues
pour les articles disponibles au plus tard 24 heures,
pour les articles avec un approvisionnement de nuit au plus tard 48 heures.
Dans le cas où nous devons commander un article auprès de notre fournisseur, notre délai d’expédition dépend de la date de réception des articles, mais les articles seront expédiés le jour même.
Notre objectif est d’envoyer les articles commandés de la manière la plus rapide, mais aussi la plus efficace et la plus sécurisée à nos clients.