EVERYDAY FREE SHIPPING on $25 & up  Excludes Marketplace items
EVERYDAY FREE SHIPPING
on $25 & up
 Excludes Marketplace
Information Security: Principles and Practices

Information Security: Principles and Practices - 06 edition

ISBN13: 978-0131547292

Cover of Information Security: Principles and Practices 06 (ISBN 978-0131547292)
ISBN13: 978-0131547292
ISBN10: 0131547291

Cover type: Paperback
Edition: 06
Copyright: 2006
Publisher: Prentice Hall, Inc.
Published: 2006
International: No

List price: $151.00

Information Security: Principles and Practices - 06 edition

ISBN13: 978-0131547292

Mark Merkow and James Breithaupt

ISBN13: 978-0131547292
ISBN10: 0131547291

Cover type: Paperback
Edition: 06
Copyright: 2006
Publisher: Prentice Hall, Inc.
Published: 2006
International: No
Summary

For a introductory course in information security covering principles and practices.

This text has been developed to cover the 10 domains in the Information Security Common Body of Knowledge. They include: Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.

Features

  • Thorough coverage of 10 domains in the Information Security Common Body of Knowledge.
    • Provides students with an understanding of widely accepted categories information security.
  • Covers why to study information security, principles of success and the future of information security.
    • Prepare students for the course of study and information security in a real world environment.
  • Appendices include: Common Body of Knowledge, Security Policy and Standards Taxonomy, Sample Policies, and HIPAA Security Rule Standards.
    • Provide students with real-life examples and additional resources.

Table of Contents

Preface

Chapter 1: Why Study Information Security?

Chapter 2: Information Security Principles of Success

Chapter 3: Certification Programs and the Common Body of Knowledge

Chapter 4: Security Management

Chapter 5: Security Architecture and Models

Chapter 6: Business Continuity Planning and Disaster Recovery Planning

Chapter 7: Law, Investigations, and Ethics

Chapter 8: Physical Security Control

Chapter 9: Operations Security

Chapter 10: Access Control Systems and Methodology

Chapter 11: Cryptography

Chapter 12: Telecommunications, Network, and Internet Security

Chapter 13: Application Development Security

Chapter 14: Securing the Future

Appendix A: Common Body of Knowledge

Appendix B: Security Policy and Standards Taxonomy

Appendix C: Sample Policies

Appendix D: HIPAA Security Rule Standards

Glossary

References