Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
STUART JACOBS is a Lecturer at Boston University, teaching graduate courses on Network and Computer Security and Enterprise Information Security, along with advising on security curricula issues. Mr. Jacobs also serves as an Industry Security Subject Matter Expert for the Alliance for the Telecommunications Industry Solutions (ATIS) and as the Technical Editor of the ATIS Technical Report "Information and Communications Security for NGN Converged Services IP Networks and Infrastructure" and ITU-T M.3410, "Guidelines and Requirements for Security Management Systems". He holds an MSc degree and CISSP Certification, and is a member of IEEE and IEEE Computer Society, Association for Computing Machinery (ACM), International Information Systems Security Certification Consortium (ISC)2, Information Systems Security Association (ISSA) and InfraGuard.
This book considers the complete security lifecycle of products and services starting with requirements and policy development and progressing through deployment, operations, and decommissioning.
Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information. Unlike other books that focus on security mechanisms, threats, and vulnerabilities, this book presents a methodology for addressing security concerns in any organization. The methodology is based on a set of concepts that are designed to examine, analyze, and document objectives, and the functional and performance capabilities that need to exist to achieve the stated goals.
This book begins by considering the importance of information security. Legal, technical, competitive, criminal, and consumer forces and influences that are rapidly changing our information dependent society are also discussed. Concepts of systems engineering are explored, as well as the value they provide to new products and services along with the maintenance and evolution to existing products and services. A discussion of security services follow along with what technical and procedural controls instantiate these services. Network protocols are examined focusing on exploitable vulnerabilities. An in-depth discussion of computer security capabilities is provided followed by consideration of modern networking security controls. The book concludes with a discussion of operations security as part of information security governance.
This new edition includes:
Over time, the technologies used for processing, storing, and communicating information have changed dramatically and rapidly. By presenting a systems engineering approach to information security, this book will assist security practitioners to cope with these rapid changes.
This book considers the complete security lifecycle of products and services starting with requirements and policy development and progressing through deployment, operations, and decommissioning.
Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information. Unlike other books that focus on security mechanisms, threats, and vulnerabilities, this book presents a methodology for addressing security concerns in any organization. The methodology is based on a set of concepts that are designed to examine, analyze, and document objectives, and the functional and performance capabilities that need to exist to achieve the stated goals.
This book begins by considering the importance of information security. Legal, technical, competitive, criminal, and consumer forces and influences that are rapidly changing our information dependent society are also discussed. Concepts of systems engineering are explored, as well as the value they provide to new products and services along with the maintenance and evolution to existing products and services. A discussion of security services follow along with what technical and procedural controls instantiate these services. Network protocols are examined focusing on exploitable vulnerabilities. An in-depth discussion of computer security capabilities is provided followed by consideration of modern networking security controls. The book concludes with a discussion of operations security as part of information security governance.
This new edition includes:
Over time, the technologies used for processing, storing, and communicating information have changed dramatically and rapidly. By presenting a systems engineering approach to information security, this book will assist security practitioners to cope with these rapid changes.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: HPB-Red, Dallas, TX, USA
Hardcover. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_424903447
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Bestandsnummer des Verkäufers 52488162-6
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Hardcover. Zustand: Good. No Jacket. Missing dust jacket; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Bestandsnummer des Verkäufers G1119101603I3N01
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Hardcover. Zustand: Good. No Jacket. Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Bestandsnummer des Verkäufers G1119101603I3N10
Anzahl: 1 verfügbar
Anbieter: BooksRun, Philadelphia, PA, USA
Hardcover. Zustand: Very Good. 2. It's a well-cared-for item that has seen limited use. The item may show minor signs of wear. All the text is legible, with all pages included. It may have slight markings and/or highlighting. Bestandsnummer des Verkäufers 1119101603-8-1
Anzahl: 1 verfügbar
Anbieter: BooksRun, Philadelphia, PA, USA
Hardcover. Zustand: Fair. 2. The item might be beaten up but readable. May contain markings or highlighting, as well as stains, bent corners, or any other major defect, but the text is not obscured in any way. Bestandsnummer des Verkäufers 1119101603-7-1
Anzahl: 1 verfügbar
Anbieter: Textbooks_Source, Columbia, MO, USA
hardcover. Zustand: Good. 2nd Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Bestandsnummer des Verkäufers 001848679U
Anzahl: 5 verfügbar
Anbieter: YESIBOOKSTORE, MIAMI, FL, USA
hardcover. Zustand: As New. This item is printed on demand. Bestandsnummer des Verkäufers 1119101603-VB
Anzahl: 1 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 23884799
Anzahl: Mehr als 20 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 746. Bestandsnummer des Verkäufers 26372524286
Anzahl: 1 verfügbar