A comprehensive textbook that introduces students to current information security practices and prepares them for various related certifications.
New to the Second Edition: Updated references to Windows 8 and Outlook 2011 A new discussion of recent Chinese hacking incidence Examples depicting the risks associated with a missing unencrypted laptop containing private data.
22831-1 Production Credits VP, Content Strategy and Implementation: Christine Emerton Director of Product Management: Laura Carney Product Manager: Ned Hinman Content Strategist: Melissa Duffy Content Coordinator: Mark Restuccia Project ...
The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance ...
Click here to save 15% off your purchase! (https: //checkout.jblearning.com/cart/Default.aspx?bc=53724-6&coupon=ISSADIGITA) Not valid with any other discounts or offers.
Information Security: Contemporary Cases addresses fundamental information security concepts in realistic scenarios. Through a series of substantive cases, different aspects of information security are addressed by real organizations. The organizations...
Print Textbook & Online Course Access: 180-day subscription.
With strong pedagogy throughout including many illustrations, step-by-step examples, and screen shots to convey important concepts, the book is ideal for undergraduate networking courses or as a self-study guide.
Upper Saddle River, NJ: Pearson/Prentice Hall. 9. Ford, R. (2020). Adaptive cybersecurity through biologically inspired infrastructure. A working paper. A colloquium presentation to the L3Harris Center of Information Assurance.
Computer Science Uluminated Javas Illuminated Computer Science Illuminated , Second Edition Nell Dale and John Lewis ISBN ... NET Come Networking Illuminated Information Security Muminated Information Security Illuminated Michael G.
Habraken, J. (1999). Cisco routers. Indianapolis, IN: Que Books. 10. Thomas, T. (2004). Network security: First step. Indianapolis, IN: Cisco Press. 11. Stallings, W. (2003). Network security essentials: Applications and standards.