Handbook of Information Security Management
by Micki Krause, Harold F. Tipton
Publisher: Auerbach Publications 1997
ISBN/ASIN: 0849399475
ISBN-13: 9780849399473
Number of pages: 752
Description:
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. With this book you will learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
Download or read it online for free here:
Read online
(online preview)
Similar books
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7657 views)
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7657 views)
Information Security in Education
- Wikibooks
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
(10900 views)
- Wikibooks
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
(10900 views)
Cryptography and Data Security
by Dorothy Elizabeth Robling Denning - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(17890 views)
by Dorothy Elizabeth Robling Denning - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(17890 views)
Security Engineering: A Guide to Building Dependable Distributed Systems
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18584 views)
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18584 views)