- Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networks
- Covers internal operations security processes of monitors, review exceptions, and plan remediation
- Over 15 new sections
- Instructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information ... Networks Security), Book Cover May Vary
📄 Viewing lite version
Full site ›
Book Details
Author(s)Stuart Jacobs
PublisherWiley-IEEE Press
ISBN / ASIN1119101603
ISBN-139781119101604
AvailabilityUsually ships in 24 hours
Sales Rank1,131,683
CategoryCOMPUTERS
MarketplaceUnited States 🇺🇸
Description ▲
Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access toinformation.
Similar Products ▼
- The Tao of Network Security Monitoring: Beyond Intrusion Detection
- Information Security Fundamentals, Second Edition
- Information Security Policies and Procedures: A Practitioner's Reference, Second Edition
- Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training)
- Managing the Human Factor in Information Security: How to win over staff and influence business managers
- Security for Telecommunications Networks (Advances in Information Security)
- Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
- The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
- Cyberlaw: The Law of the Internet and Information Technology
- Health Care Information Systems: A Practical Approach for Health Care Management
More Books in COMPUTERS
Deploying IP and MPLS QoS for Multiservice Networks: T…
View
Satellite and Terrestrial Radio Positioning Techniques…
View
Letting Go of the Words: Writing Web Content that Work…
View
DSP for Embedded and Real-Time Systems
View
Hacking with Kali: Practical Penetration Testing Techn…
View
Handbook on Securing Cyber-Physical Critical Infrastru…
View
The Basics of IT Audit: Purposes, Processes, and Pract…
View
Python Forensics: A workbench for inventing and sharin…
View
Machine Learning: A Bayesian and Optimization Perspect…
View