Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Merkow, Mark S.

Title Information security : principles and practices / Mark S. Merkow, Jim Breithaupt. [O'Reilly electronic resource]

Edition 2nd ed.
Imprint Indianapolis, Ind. : Pearson Education, ©2014.
QR Code
Description 1 online resource (1 volume) : illustrations
Series Certification/Training Ser.
Certification/Training Ser.
Note Includes index.
Summary Annotation Information Security: Principles and Practices, Second EditionEverything You Need to Know About Modern Computer Security, in One BookClearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)2 CBK]. Thoroughly updated for today's challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career. Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Two highly experienced security practitioners have brought together all the foundational knowledge you need to succeed in today's IT and business environments. They offer easy-to-understand, practical coverage of topics ranging from security management and physical security to cryptography and application development security. This edition fully addresses new trends that are transforming security, from cloud services to mobile applications, "Bring Your Own Device" (BYOD) strategies to today's increasingly rigorous compliance requirements. Throughout, you'll find updated case studies, review questions, and exercises-all designed to reveal today's real-world IT security challenges and help you overcome them. Learn how to-- Recognize the evolving role of IT security-- Identify the best new opportunities in the field-- Discover today's core information security principles of success-- Understand certification programs and the CBK-- Master today's best practices for governance and risk management-- Architect and design systems to maximize security-- Plan for business continuity-- Understand the legal, investigatory, and ethical requirements associated with IT security-- Improve physical and operational security-- Implement effective access control systems-- Effectively utilize cryptography-- Improve network and Internet security-- Build more secure software-- Define more effective security policies and standards-- Preview the future of information security.
Subject Computer security.
Data protection.
Computer networks -- Security measures.
Internet -- Security measures.
Information technology -- Security measures.
Sécurité informatique.
Protection de l'information (Informatique)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Internet -- Sécurité -- Mesures.
Technologie de l'information -- Sécurité -- Mesures.
Computer networks -- Security measures
Computer security
Data protection
Information technology -- Security measures
Internet -- Security measures
Added Author Breithaupt, Jim, 1955-
ISBN 9780133589627 (electronic bk.)
0133589625 (electronic bk.)
0789753251
9780789753250
Standard No. 9780789753250
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information