Higher Ed. and Vocational >> Engineering and Computer Science >> Computer Science >> Security


Information Security: Principles and Practices

Information Security:   Principles and Practices

Author(s):
  • Mark Merkow
  • James Breithaupt
  • Author: Mark Merkow
    • ISBN:9788131712887
    • 10 Digit ISBN:8131712885
    • Price:Rs. 1060.00
    • Pages:275
    • Imprint:Pearson Education
    • Binding:Paperback
    • Status:Available


    Ratings:

    For a introductory course in information security covering principles and practices.





    This text has been developed to cover the 10 domains in the Information Security Common Body of Knowledge. They include: Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.


    Table of Content

    • Preface
    1. Why Study Information Security?
    2. Information Security Principles of Success
    3. Certification Programs and the Common Body of Knowledge
    4. Security Management
    5. Security Architecture and Models
    6. Business Continuity Planning and Disaster Recovery Planning
    7. Law, Investigations, and Ethics
    8. Physical Security Control
    9. Operations Security
    10. Access Control Systems and Methodology
    11. Cryptography
    12. Telecommunications, Network, and Internet Security
    13. Application Development Security
    14. Securing the Future
    • Appendix A: Common Body of Knowledge
    • Appendix B: Security Policy and Standards Taxonomy
    • Appendix C: Sample Policies
    • Appendix D: HIPAA Security Rule Standards
    • Glossary
    • References

    Salient Features

    • Information Security Principles and Practices provides thorough coverage of each domain so students understand these widely accepted categories of information security.
    • This text’s coverage of why students need to know about information security, principles of success and the future of information security prepares them for the real-world environment.
    • Appendices include: Common Body of Knowledge, Security Policy and Standards Taxonomy, Sample Policies, and HIPAA Security Rule Standards, which provides students with real-life examples and additional resources.