PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!
Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. The first part of Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access contol programs. It then looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. The final part is a resource for students and professionals which disucsses putting access control systems to work as well as testing and managing them.
Access Control, Authentication, and Public Key Infrastructure (Information Systems Security & Assurance)
📄 Viewing lite version
Full site ›
Book Details
PublisherJones & Bartlett Learning
ISBN / ASIN0763791288
ISBN-139780763791285
Sales Rank1,409,548
CategoryComputers
MarketplaceUnited States 🇺🇸
Description ▲
Similar Products ▼
- Security Policies and Implementation Issues (Information Systems Security & Assurance)
- Security Strategies in Windows Platforms and Applications (J & B Learning Information Systems Security & Assurance Series)
- Managing Risk in Information Systems (Information Systems Security & Assurance Series)
- System Forensics, Investigation, and Response (Information Systems Security & Assurance)
- Network Security, Firewalls, and VPNs (Jones & Bartlett Learning Information Systems Security & Assurance)
- Legal Issues in Information Security (Jones & Bartlett Learning Information Systems Security & Assurance)
- Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
- Cloud Computing Bible
- Cryptography InfoSec Pro Guide
- Authentication: From Passwords to Public Keys
More Books in Computers
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View