In todayOCOs technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources."
This edition addresses today's newest trends, from cloud and mobile security to BYOD and the latest compliance requirements. The authors present updated real-life case studies, review questions, and exercises throughout.
This book figures out ways to boil down critical exam and job landing concepts into real world applications and scenarios. Which makes this book user-friendly, interactive, and valuable as a resource long after students pass the exam.
The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: ...
Copyright © 2014 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, ... Pearson IT Certification cannot attest to the accuracy of this information. Use of a term in this book should not be regarded ...
Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas of Certified Information Systems Security Professional certification throughout and include many examples of issues faced by ...
Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Computer Security:...
This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers...
The real threat to information system security comes from people, not computers. That's why students need to understand both the technical implementation of security controls, as well as the softer...
Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter.