Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/841
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, David ; (Information technology security consultant), ; author ; | en_US |
dc.contributor.author | Solomon, Michael ; (Michael G.), ; 1963- ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:35Z | - |
dc.date.available | 2020-05-17T08:22:35Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9781284116458 ; (pbk.) ; | en_US |
dc.identifier.isbn | 128411645X ; (pbk.) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/841 | - |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | "Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website ; | en_US |
dc.description.statementofresponsibility | David Kim, Michael G. Solomon | en_US |
dc.description.tableofcontents | Preface -- ; Acknowledgements -- ; The authors -- ; Part I. ; The Need for Information Security : -- ; 1. ; Information Systems Security -- ; 2. ; The Internet of Things is Changing How We Live -- ; 3. ; Malicious Attacks, Threats, and Vulnerabilities -- ; 4. ; The Drivers of the Information Security Business -- ; Part II. ; Securing Today's Information Systems : -- ; 5. ; Access controls -- ; 6. ; Security Operations and Administration -- ; 7. ; Auditing, Testing, and Monitoring -- ; 8. ; Risk, Response, and Recovery -- ; 9. ; Cryptography -- ; 10. ; Networks and Telecommunications -- ; 11. ; Malicious Code and Activity -- ; Part III. ; Information Security Standards, Education, Certifications, and Laws : -- ; 12. ; Information Security Standards -- ; 13. ; Information Systems Security Education and Training -- ; 14. ; Information Security Professional Certifications -- ; 15. ; U.S. Compliance Laws -- ; Appendix A. Answer key -- ; Appendix B. Standard acronyms -- ; Appendix C. Earning the CompTIA security + certification -- ; Glossary of key terms -- ; References -- ; Index ; | en_US |
dc.format.extent | xxii, 548 pages ; ; 24 cm ; | en_US |
dc.format.extent | Includes bibliographical references (pages 522-526) and index ; | en_US |
dc.publisher | Jones & Bartlett Learning, | en_US |
dc.relation.ispartofseries | ISSA, Information systems security & assurance series ; | en_US |
dc.relation.ispartofseries | Jones & Bartlett Learning information systems security & assurance series ; | en_US |
dc.relation.haspart | 9781284116458.pdf | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Information resources ; Security measures ; | en_US |
dc.subject | Seguridad informeetica ; | en_US |
dc.subject | Recursos de informacien ; Medidas de seguridad ; | en_US |
dc.subject.lcc | QA76.9.A25 ; K536 2018 ; | en_US |
dc.title | Fundamentals of information systems security / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Burlington, MA : | en_US |
dc.date.edition | Third edition ; | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781284116458.pdf | 11 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, David ; (Information technology security consultant), ; author ; | en_US |
dc.contributor.author | Solomon, Michael ; (Michael G.), ; 1963- ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:35Z | - |
dc.date.available | 2020-05-17T08:22:35Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9781284116458 ; (pbk.) ; | en_US |
dc.identifier.isbn | 128411645X ; (pbk.) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/841 | - |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | "Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website ; | en_US |
dc.description.statementofresponsibility | David Kim, Michael G. Solomon | en_US |
dc.description.tableofcontents | Preface -- ; Acknowledgements -- ; The authors -- ; Part I. ; The Need for Information Security : -- ; 1. ; Information Systems Security -- ; 2. ; The Internet of Things is Changing How We Live -- ; 3. ; Malicious Attacks, Threats, and Vulnerabilities -- ; 4. ; The Drivers of the Information Security Business -- ; Part II. ; Securing Today's Information Systems : -- ; 5. ; Access controls -- ; 6. ; Security Operations and Administration -- ; 7. ; Auditing, Testing, and Monitoring -- ; 8. ; Risk, Response, and Recovery -- ; 9. ; Cryptography -- ; 10. ; Networks and Telecommunications -- ; 11. ; Malicious Code and Activity -- ; Part III. ; Information Security Standards, Education, Certifications, and Laws : -- ; 12. ; Information Security Standards -- ; 13. ; Information Systems Security Education and Training -- ; 14. ; Information Security Professional Certifications -- ; 15. ; U.S. Compliance Laws -- ; Appendix A. Answer key -- ; Appendix B. Standard acronyms -- ; Appendix C. Earning the CompTIA security + certification -- ; Glossary of key terms -- ; References -- ; Index ; | en_US |
dc.format.extent | xxii, 548 pages ; ; 24 cm ; | en_US |
dc.format.extent | Includes bibliographical references (pages 522-526) and index ; | en_US |
dc.publisher | Jones & Bartlett Learning, | en_US |
dc.relation.ispartofseries | ISSA, Information systems security & assurance series ; | en_US |
dc.relation.ispartofseries | Jones & Bartlett Learning information systems security & assurance series ; | en_US |
dc.relation.haspart | 9781284116458.pdf | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Information resources ; Security measures ; | en_US |
dc.subject | Seguridad informeetica ; | en_US |
dc.subject | Recursos de informacien ; Medidas de seguridad ; | en_US |
dc.subject.lcc | QA76.9.A25 ; K536 2018 ; | en_US |
dc.title | Fundamentals of information systems security / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Burlington, MA : | en_US |
dc.date.edition | Third edition ; | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781284116458.pdf | 11 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, David ; (Information technology security consultant), ; author ; | en_US |
dc.contributor.author | Solomon, Michael ; (Michael G.), ; 1963- ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:35Z | - |
dc.date.available | 2020-05-17T08:22:35Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9781284116458 ; (pbk.) ; | en_US |
dc.identifier.isbn | 128411645X ; (pbk.) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/841 | - |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | "Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws."--Publisher's website ; | en_US |
dc.description.statementofresponsibility | David Kim, Michael G. Solomon | en_US |
dc.description.tableofcontents | Preface -- ; Acknowledgements -- ; The authors -- ; Part I. ; The Need for Information Security : -- ; 1. ; Information Systems Security -- ; 2. ; The Internet of Things is Changing How We Live -- ; 3. ; Malicious Attacks, Threats, and Vulnerabilities -- ; 4. ; The Drivers of the Information Security Business -- ; Part II. ; Securing Today's Information Systems : -- ; 5. ; Access controls -- ; 6. ; Security Operations and Administration -- ; 7. ; Auditing, Testing, and Monitoring -- ; 8. ; Risk, Response, and Recovery -- ; 9. ; Cryptography -- ; 10. ; Networks and Telecommunications -- ; 11. ; Malicious Code and Activity -- ; Part III. ; Information Security Standards, Education, Certifications, and Laws : -- ; 12. ; Information Security Standards -- ; 13. ; Information Systems Security Education and Training -- ; 14. ; Information Security Professional Certifications -- ; 15. ; U.S. Compliance Laws -- ; Appendix A. Answer key -- ; Appendix B. Standard acronyms -- ; Appendix C. Earning the CompTIA security + certification -- ; Glossary of key terms -- ; References -- ; Index ; | en_US |
dc.format.extent | xxii, 548 pages ; ; 24 cm ; | en_US |
dc.format.extent | Includes bibliographical references (pages 522-526) and index ; | en_US |
dc.publisher | Jones & Bartlett Learning, | en_US |
dc.relation.ispartofseries | ISSA, Information systems security & assurance series ; | en_US |
dc.relation.ispartofseries | Jones & Bartlett Learning information systems security & assurance series ; | en_US |
dc.relation.haspart | 9781284116458.pdf | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Information resources ; Security measures ; | en_US |
dc.subject | Seguridad informeetica ; | en_US |
dc.subject | Recursos de informacien ; Medidas de seguridad ; | en_US |
dc.subject.lcc | QA76.9.A25 ; K536 2018 ; | en_US |
dc.title | Fundamentals of information systems security / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Burlington, MA : | en_US |
dc.date.edition | Third edition ; | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781284116458.pdf | 11 MB | Adobe PDF | Preview File |