Book Details

Instructors may access teaching resources by clicking the ‘Request Instructor Resources’ tab next to the title.
Please note that you can subscribe to a maximum of 2 titles.

Information Security: Principles and Practices, 1/e


Information Security: Principles and Practices, 1/e
Author(s)  Mark Merkow and James Breithaupt
ISBN  9788131712887
Imprint  Pearson Education
Copyright  2007
Pages  275
Binding  Paperback
List Price  Rs. 1060.00
  
 
 

For a introductory course in information security covering principles and practices. This text has been developed to cover the 10 domains in the Information Security Common Body of Knowledge. They include: Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.
  • Contents
  • Features
  • Downloadable Resources

  • Preface

  1. Why Study Information Security?
  2. Information Security Principles of Success

  3. Certification Programs and the Common Body of Knowledge

  4. Security Management

  5. Security Architecture and Models
  6. Business Continuity Planning and Disaster Recovery Planning

  7. Law, Investigations, and Ethics
  8. Physical Security Control
  9. Operations Security

  10. Access Control Systems and Methodology
  11. Cryptography

  12. Telecommunications, Network, and Internet Security
  13. Application Development Security

  14. Securing the Future

  • Appendix A: Common Body of Knowledge
  • Appendix B: Security Policy and Standards Taxonomy

  • Appendix C: Sample Policies

  • Appendix D: HIPAA Security Rule Standards
  • Glossary

  • References
 

  • Information Security Principles and Practices provides thorough coverage of each domain so students understand these widely accepted categories of information security.

  • This text’s coverage of why students need to know about information security, principles of success and the future of information security prepares them for the real-world environment.

  • Appendices include: Common Body of Knowledge, Security Policy and Standards Taxonomy, Sample Policies, and HIPAA Security Rule Standards, which provides students with real-life examples and additional resources.
 
 
Username/ Email  
Password  
If you are new to this site, and you do not have a username and password, please register.