Book Description
"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.
Author : Gupta, Jatinder N. D.
Publisher : IGI Global
Page : 586 pages
File Size : 38,92 MB
Release : 2008-08-31
Category : Computers
ISBN : 1599048566
"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.
Author : Gupta, Manish
Publisher : IGI Global
Page : 596 pages
File Size : 17,31 MB
Release : 2008-12-31
Category : Law
ISBN : 1605661333
"This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.
Author : Knapp, Kenneth J.
Publisher : IGI Global
Page : 458 pages
File Size : 10,68 MB
Release : 2009-04-30
Category : Computers
ISBN : 1605663271
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.
Author : Fields, Ziska
Publisher : IGI Global
Page : 673 pages
File Size : 11,62 MB
Release : 2018-06-22
Category : Computers
ISBN : 1522547649
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them. The Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.
Author : Corey Schou
Publisher : McGraw Hill Professional
Page : 481 pages
File Size : 10,31 MB
Release : 2014-09-12
Category : Computers
ISBN : 0071826319
Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems. Chapter-ending critical thinking exercises reinforce the material covered. An extensive list of scholarly works and international government standards is also provided in this detailed guide. Comprehensive coverage includes: Basic information assurance principles and concepts Information assurance management system Current practices, regulations, and plans Impact of organizational structure Asset management Risk management and mitigation Human resource assurance Advantages of certification, accreditation, and assurance Information assurance in system development and acquisition Physical and environmental security controls Information assurance awareness, training, and education Access control Information security monitoring tools and methods Information assurance measurements and metrics Incident handling and computer forensics Business continuity management Backup and restoration Cloud computing and outsourcing strategies Information assurance big data concerns
Author : Cruz-Cunha, Maria Manuela
Publisher : IGI Global
Page : 753 pages
File Size : 32,90 MB
Release : 2020-08-21
Category : Computers
ISBN : 1799857298
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.
Author : David Kim
Publisher : Jones & Bartlett Publishers
Page : 569 pages
File Size : 36,22 MB
Release : 2013-07-11
Category : Business & Economics
ISBN : 1284031640
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. New to the Second Edition: - New material on cloud computing, risk analysis, IP mobility, OMNIBus, and Agile Software Development. - Includes the most recent updates in Information Systems Security laws, certificates, standards, amendments, and the proposed Federal Information Security Amendments Act of 2013 and HITECH Act. - Provides new cases and examples pulled from real-world scenarios. - Updated data, tables, and sidebars provide the most current information in the field.
Author : Maria Manuela Cruz-Cunha
Publisher : Information Science Reference
Page : 0 pages
File Size : 35,59 MB
Release : 2014
Category : Computer crimes
ISBN : 9781466663244
"This book combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere"--
Author : Dark, Melissa Jane
Publisher : IGI Global
Page : 306 pages
File Size : 40,83 MB
Release : 2010-08-31
Category : Business & Economics
ISBN : 161692246X
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives offers insight into social and ethical challenges presented by modern technology. Aimed at students and practitioners in the rapidly growing field of information assurance and security, this book address issues of privacy, access, safety, liability and reliability in a manner that asks readers to think about how the social context is shaping technology and how technology is shaping social context and, in so doing, to rethink conceptual boundaries.
Author : Stuart Jacobs
Publisher : John Wiley & Sons
Page : 784 pages
File Size : 15,51 MB
Release : 2015-12-01
Category : Technology & Engineering
ISBN : 1119104718
Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information. Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networks Covers internal operations security processes of monitors, review exceptions, and plan remediation Over 15 new sections Instructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam If you are an instructor and adopted this book for your course, please email [email protected] to get access to the additional instructor materials for this book.