Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/841
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKim, David ; (Information technology security consultant), ; author ;en_US
dc.contributor.authorSolomon, Michael ; (Michael G.), ; 1963- ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:35Z-
dc.date.available2020-05-17T08:22:35Z-
dc.date.issued2018en_US
dc.identifier.isbn9781284116458 ; (pbk.) ;en_US
dc.identifier.isbn128411645X ; (pbk.) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/841-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstract"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website ;en_US
dc.description.statementofresponsibilityDavid Kim, Michael G. Solomonen_US
dc.description.tableofcontentsPreface -- ; Acknowledgements -- ; The authors -- ; Part I. ; The Need for Information Security : -- ; 1. ; Information Systems Security -- ; 2. ; The Internet of Things is Changing How We Live -- ; 3. ; Malicious Attacks, Threats, and Vulnerabilities -- ; 4. ; The Drivers of the Information Security Business -- ; Part II. ; Securing Today's Information Systems : -- ; 5. ; Access controls -- ; 6. ; Security Operations and Administration -- ; 7. ; Auditing, Testing, and Monitoring -- ; 8. ; Risk, Response, and Recovery -- ; 9. ; Cryptography -- ; 10. ; Networks and Telecommunications -- ; 11. ; Malicious Code and Activity -- ; Part III. ; Information Security Standards, Education, Certifications, and Laws : -- ; 12. ; Information Security Standards -- ; 13. ; Information Systems Security Education and Training -- ; 14. ; Information Security Professional Certifications -- ; 15. ; U.S. Compliance Laws -- ; Appendix A. Answer key -- ; Appendix B. Standard acronyms -- ; Appendix C. Earning the CompTIA security + certification -- ; Glossary of key terms -- ; References -- ; Index ;en_US
dc.format.extentxxii, 548 pages ; ; 24 cm ;en_US
dc.format.extentIncludes bibliographical references (pages 522-526) and index ;en_US
dc.publisherJones & Bartlett Learning,en_US
dc.relation.ispartofseriesISSA, Information systems security & assurance series ;en_US
dc.relation.ispartofseriesJones & Bartlett Learning information systems security & assurance series ;en_US
dc.relation.haspart9781284116458.pdfen_US
dc.subjectComputer security ;en_US
dc.subjectInformation resources ; Security measures ;en_US
dc.subjectSeguridad informeetica ;en_US
dc.subjectRecursos de informacien ; Medidas de seguridad ;en_US
dc.subject.lccQA76.9.A25 ; K536 2018 ;en_US
dc.titleFundamentals of information systems security /en_US
dc.typeBooken_US
dc.publisher.placeBurlington, MA :en_US
dc.date.editionThird edition ;en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781284116458.pdf11 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKim, David ; (Information technology security consultant), ; author ;en_US
dc.contributor.authorSolomon, Michael ; (Michael G.), ; 1963- ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:35Z-
dc.date.available2020-05-17T08:22:35Z-
dc.date.issued2018en_US
dc.identifier.isbn9781284116458 ; (pbk.) ;en_US
dc.identifier.isbn128411645X ; (pbk.) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/841-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstract"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website ;en_US
dc.description.statementofresponsibilityDavid Kim, Michael G. Solomonen_US
dc.description.tableofcontentsPreface -- ; Acknowledgements -- ; The authors -- ; Part I. ; The Need for Information Security : -- ; 1. ; Information Systems Security -- ; 2. ; The Internet of Things is Changing How We Live -- ; 3. ; Malicious Attacks, Threats, and Vulnerabilities -- ; 4. ; The Drivers of the Information Security Business -- ; Part II. ; Securing Today's Information Systems : -- ; 5. ; Access controls -- ; 6. ; Security Operations and Administration -- ; 7. ; Auditing, Testing, and Monitoring -- ; 8. ; Risk, Response, and Recovery -- ; 9. ; Cryptography -- ; 10. ; Networks and Telecommunications -- ; 11. ; Malicious Code and Activity -- ; Part III. ; Information Security Standards, Education, Certifications, and Laws : -- ; 12. ; Information Security Standards -- ; 13. ; Information Systems Security Education and Training -- ; 14. ; Information Security Professional Certifications -- ; 15. ; U.S. Compliance Laws -- ; Appendix A. Answer key -- ; Appendix B. Standard acronyms -- ; Appendix C. Earning the CompTIA security + certification -- ; Glossary of key terms -- ; References -- ; Index ;en_US
dc.format.extentxxii, 548 pages ; ; 24 cm ;en_US
dc.format.extentIncludes bibliographical references (pages 522-526) and index ;en_US
dc.publisherJones & Bartlett Learning,en_US
dc.relation.ispartofseriesISSA, Information systems security & assurance series ;en_US
dc.relation.ispartofseriesJones & Bartlett Learning information systems security & assurance series ;en_US
dc.relation.haspart9781284116458.pdfen_US
dc.subjectComputer security ;en_US
dc.subjectInformation resources ; Security measures ;en_US
dc.subjectSeguridad informeetica ;en_US
dc.subjectRecursos de informacien ; Medidas de seguridad ;en_US
dc.subject.lccQA76.9.A25 ; K536 2018 ;en_US
dc.titleFundamentals of information systems security /en_US
dc.typeBooken_US
dc.publisher.placeBurlington, MA :en_US
dc.date.editionThird edition ;en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781284116458.pdf11 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKim, David ; (Information technology security consultant), ; author ;en_US
dc.contributor.authorSolomon, Michael ; (Michael G.), ; 1963- ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:35Z-
dc.date.available2020-05-17T08:22:35Z-
dc.date.issued2018en_US
dc.identifier.isbn9781284116458 ; (pbk.) ;en_US
dc.identifier.isbn128411645X ; (pbk.) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/841-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstract"Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website ;en_US
dc.description.statementofresponsibilityDavid Kim, Michael G. Solomonen_US
dc.description.tableofcontentsPreface -- ; Acknowledgements -- ; The authors -- ; Part I. ; The Need for Information Security : -- ; 1. ; Information Systems Security -- ; 2. ; The Internet of Things is Changing How We Live -- ; 3. ; Malicious Attacks, Threats, and Vulnerabilities -- ; 4. ; The Drivers of the Information Security Business -- ; Part II. ; Securing Today's Information Systems : -- ; 5. ; Access controls -- ; 6. ; Security Operations and Administration -- ; 7. ; Auditing, Testing, and Monitoring -- ; 8. ; Risk, Response, and Recovery -- ; 9. ; Cryptography -- ; 10. ; Networks and Telecommunications -- ; 11. ; Malicious Code and Activity -- ; Part III. ; Information Security Standards, Education, Certifications, and Laws : -- ; 12. ; Information Security Standards -- ; 13. ; Information Systems Security Education and Training -- ; 14. ; Information Security Professional Certifications -- ; 15. ; U.S. Compliance Laws -- ; Appendix A. Answer key -- ; Appendix B. Standard acronyms -- ; Appendix C. Earning the CompTIA security + certification -- ; Glossary of key terms -- ; References -- ; Index ;en_US
dc.format.extentxxii, 548 pages ; ; 24 cm ;en_US
dc.format.extentIncludes bibliographical references (pages 522-526) and index ;en_US
dc.publisherJones & Bartlett Learning,en_US
dc.relation.ispartofseriesISSA, Information systems security & assurance series ;en_US
dc.relation.ispartofseriesJones & Bartlett Learning information systems security & assurance series ;en_US
dc.relation.haspart9781284116458.pdfen_US
dc.subjectComputer security ;en_US
dc.subjectInformation resources ; Security measures ;en_US
dc.subjectSeguridad informeetica ;en_US
dc.subjectRecursos de informacien ; Medidas de seguridad ;en_US
dc.subject.lccQA76.9.A25 ; K536 2018 ;en_US
dc.titleFundamentals of information systems security /en_US
dc.typeBooken_US
dc.publisher.placeBurlington, MA :en_US
dc.date.editionThird edition ;en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781284116458.pdf11 MBAdobe PDFThumbnail
Preview File