Logo

Handbook of Information Security Management

Large book cover: Handbook of Information Security Management

Handbook of Information Security Management
by

Publisher: Auerbach Publications
ISBN/ASIN: 0849399475
ISBN-13: 9780849399473
Number of pages: 752

Description:
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. With this book you will learn how to take the offensive in the battle against information security threats by seeing how the experts do it.

Download or read it online for free here:
Read online
(online preview)

Similar books

Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7657 views)
Book cover: Information Security in EducationInformation Security in Education
- Wikibooks
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
(10900 views)
Book cover: Cryptography and Data SecurityCryptography and Data Security
by - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(17890 views)
Book cover: Security Engineering: A Guide to Building Dependable Distributed SystemsSecurity Engineering: A Guide to Building Dependable Distributed Systems
by - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18584 views)