<b><i>Engineering Information Security </i>covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to</b> <b>information.</b><br /><br /> <ul> <li>Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networks</li> <li>Covers internal operations security processes of monitors, review exceptions, and plan remediation</li> <li>Over 15 new sections</li> <li>Instructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam</li> </ul> If you are an instructor and adopted this book for your course, please email ieeeproposals@wiley.com to get access to the additional instructor materials for this book.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
<p><b>STUART JACOBS</b> is a Lecturer at Boston University, teaching graduate courses on Network and Computer Security and Enterprise Information Security, along with advising on security curricula issues. Mr. Jacobs also serves as an Industry Security Subject Matter Expert for the Alliance for the Telecommunications Industry Solutions (ATIS) and as the Technical Editor of the ATIS Technical Report "Information and Communications Security for NGN Converged Services IP Networks and Infrastructure" and ITU-T M.3410, "Guidelines and Requirements for Security Management Systems". He holds an MSc degree and CISSP Certification, and is a member of IEEE and IEEE Computer Society, Association for Computing Machinery (ACM), International Information Systems Security Certification Consortium (ISC)2, Information Systems Security Association (ISSA) and InfraGuard.
<p><b>This book considers the complete security lifecycle of products and services starting with requirements and policy development and progressing through deployment, operations, and decommissioning.</b> <p>Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information. Unlike other books that focus on security mechanisms, threats, and vulnerabilities, this book presents a methodology for addressing security concerns in any organization. The methodology is based on a set of concepts that are designed to examine, analyze, and document objectives, and the functional and performance capabilities that need to exist to achieve the stated goals. <p>This book begins by considering the importance of information security. Legal, technical, competitive, criminal, and consumer forces and influences that are rapidly changing our information dependent society are also discussed. Concepts of systems engineering are explored, as well as the value they provide to new products and services along with the maintenance and evolution to existing products and services. A discussion of security services follow along with what technical and procedural controls instantiate these services. Network protocols are examined focusing on exploitable vulnerabilities. An in-depth discussion of computer security capabilities is provided followed by consideration of modern networking security controls. The book concludes with a discussion of operations security as part of information security governance. <p><b>This new edition includes:</b> <ul> <li>Fifteen new sections throughout</li> <li>Additional discussions on SCADA, Cloud, Sensor, Ad Hoc networks, and HTTP Basic and</li> <li>Digest authentication</li> <li>Coverage of code reviews, code scanning tools and testing, and SSL VPNs</li> <li>Instructor resources include lecture slides, example quizzes, assignments, and a</li> <li>final examination</li> <li>Seven online appendices that include: example information security policies, security</li> <li>requirements, a security Statement of Work, and risk management tables suitable for</li> <li>SQL implementation</li> </ul> <p>Over time, the technologies used for processing, storing, and communicating information have changed dramatically and rapidly. By presenting a systems engineering approach to information security, this book will assist security practitioners to cope with these rapid changes.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 18,74 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 7,74 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages. Codice articolo 52488162-6
Quantità: 1 disponibili
Da: SecondSale, Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00076052143
Quantità: 1 disponibili
Da: Bay State Book Company, North Smithfield, RI, U.S.A.
Condizione: good. The book is in good condition with all pages and cover intact, including the dust jacket if originally issued. The spine may show light wear. Pages may contain some notes or highlighting, and there might be a "From the library of" label. Boxed set packaging, shrink wrap, or included media like CDs may be missing. Codice articolo BSM.KG6H
Quantità: 1 disponibili
Da: Bay State Book Company, North Smithfield, RI, U.S.A.
Condizione: acceptable. The book is complete and readable, with all pages and cover intact. Dust jacket, shrink wrap, or boxed set case may be missing. Pages may have light notes, highlighting, or minor water exposure, but nothing that affects readability. May be an ex-library copy and could include library markings or stickers. Codice articolo BSM.FBNJ
Quantità: 1 disponibili
Da: BooksRun, Philadelphia, PA, U.S.A.
Hardcover. Condizione: Fair. 2. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Codice articolo 1119101603-7-1
Quantità: 1 disponibili
Da: BooksRun, Philadelphia, PA, U.S.A.
Hardcover. Condizione: Very Good. 2. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Codice articolo 1119101603-8-1
Quantità: 1 disponibili
Da: Books for Life, LAUREL, MD, U.S.A.
Condizione: good. Book is in good condition. Minimal signs of wear. It May have markings or highlights, but kept to only a few pages. May not come with supplemental materials if applicable. Codice articolo LFM.50OX
Quantità: 1 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Codice articolo 23884799-5
Quantità: 5 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Codice articolo 23884799-5
Quantità: 5 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
Hardcover. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_424903447
Quantità: 1 disponibili