Introduction to Information Security: A Strategic-Based Approach

Introduction to Information Security: A Strategic-Based Approach
ISBN-10
1597499722
ISBN-13
9781597499729
Category
Computers
Pages
382
Language
English
Published
2013-11-12
Publisher
Newnes
Authors
Timothy Shimeall, Jonathan Spring

Description

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel. Provides a broad introduction to the methods and techniques in the field of information security Offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information Provides very current view of the emerging standards of practice in information security

Similar books

  • The InfoSec Handbook: An Introduction to Information Security
    By Umesha Nayak, Umesh Hodeghatta Rao

    This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist.

  • Introduction to Cyber Security: Fundamentals
    By Ugo Ekpo

    The objective of this book is to provide the essentials regarding what Cyber security is really about and not the perception of it being related purely to hacking activity.It will provide the fundamental considerations for those who are ...

  • Introduction to Cyber Security: Guide to the World of Cyber Security
    By Anand Shinde

    It can serve as a reference manual for those working in the Cyber Security domain. The book takes a dip in history to talk about the very first computer virus, and at the same time, discusses in detail about the latest cyber threats.

  • A Multidisciplinary Introduction to Information Security
    By Stig F. Mjolsnes

    The mobile terminal is uniquely identified globally by its international mo- bile subscriber identity (IMSI). The IMSI consists of three fields: (1) a country code identifying the country in which the mobile terminal is registered, ...

  • Introduction to Machine Learning with Applications in Information Security
    By Mark Stamp

    [46] M. Dredze, R. Gevaryahu, and A. Elias-Bachrach, Learning fast classifiers for image spam, CEAS 2007 Cited on page 298 [47] R. Durbin, S. Eddy, A. Krogh, and G. Mitchison, Biological Sequence Analysis: Probabilistic Models of ...

  • Introduction to Computer Security
    By Michael T. Goodrich, Roberto Tamassia

    Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals.

  • Introduction to Computer Security
    By Matthew A. Bishop

    In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples...

  • The InfoSec Handbook: An Introduction to Information Security
    By Umesha Nayak, Umesh Hodeghatta Rao

    This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist.

  • Foundations of Information Security: A Straightforward Introduction
    By Jason Andress

    You'll also learn the basics of topics like: Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process The principles behind modern cryptography, including symmetric and asymmetric ...

  • Introduction to Computer and Network Security: Navigating Shades of Gray
    By Richard R. Brooks

    Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system ...