Företag & Bibliotek

Avancerad sökning
Din kundvagn är tom
Ändra i din kundvagn Gå till kassan

Information systems and security


Jones & Bartlett have a new series on information systems and security. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area.

These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking - putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.



Access Control, Authentication, And Public Key Infrastructure

av Bill Ballad

Managing Risk In Information Systems

av Darril Gibson

Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure.

This book provides a unique look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery Domain.

Tipsa en kompis!
Lägg i kundvagn
Tipsa en kompis!
Lägg i kundvagn

Legal Issues In Information Security

av Joanna Lyn Grama

Security Strategies in Web Applications and Social Networking

Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect governmental and corporate infrastructure.

Security Strategies in Web Applications and Social Networking provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications.

Tipsa en kompis!
Lägg i kundvagn
Tipsa en kompis!
Lägg i kundvagn

Security Strategies In Linux Platforms And Applications

Security Policies And Implementation Issues

Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field.

Security Policies and Implementation Issues offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation.

Tipsa en kompis!
Lägg i kundvagn
Tipsa en kompis!
Lägg i kundvagn

Security Strategies In Windows Platforms And Applications

Fundamentals Of Information Systems Security

av David Kim

Written by an industry expert, Security Strategies in Windows Platforms and Applications focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system.

This book will take readers through the fundamentals of information security adapted from the Official (ISC)2 SSCP CBK Study Guide. It reviews the seven domains within the Systems Security Certified Professional certification.

Tipsa en kompis!
Tipsa en kompis!
Lägg i kundvagn

Computer Security

av Robert C. Newman

Hacker Techniques, Tools, And Incident Handling

av Sean Philip Oriyano

This book provides a broad approach to computer-related crime, electronic commerce, corporate networking, and Internet security, topics that have become increasingly important as more threats are made.

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks.

Tipsa en kompis!
Lägg i kundvagn
Tipsa en kompis!
Lägg i kundvagn

Network Security, Firewalls, and VPNS

av J. Michael Stewart

System Forensics, Investigation, And Response

Network Security, Firewalls, and VPNs provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet.

Computer crimes call for forensics specialists, people who know how to find and follow the evidence. This books begins by examining the fundamentals of system forensics, and also gives an overview of computer crimes.

Tipsa en kompis!
Lägg i kundvagn
Tipsa en kompis!
Lägg i kundvagn

Auditing IT Infrastructures for Compliance

av Martin Weiss

This book identifies and explains what each of the compliancy laws requires. It then discusses how to audit an IT infrastructure for compliance based on the laws and the need to protect and secure business and consumer privacy data.

Tipsa en kompis!
Lägg i kundvagn