Ship-Ship-Hooray! Free Shipping on $25+ Details >
Information Security: Principles and Practices

Information Security: Principles and Practices - 2nd edition

Information Security: Principles and Practices - 2nd edition

ISBN13: 9780789753250

ISBN10: 0789753251

Information Security: Principles and Practices by Mark S. Merkow - ISBN 9780789753250
Cover type: Paperback
Edition: 2ND 14
Copyright: 2014
Publisher: Pearson
Published:
International: No
Information Security: Principles and Practices by Mark S. Merkow - ISBN 9780789753250

ISBN13: 9780789753250

ISBN10: 0789753251

Cover type: Paperback
Edition: 2ND 14

List price: $80.00

Happy you, happy us. You get 24-hour turnaround. Free shipping on $25+, and dedicated customer service. Cue the smiley faces.

Ships directly from us
You Save $3.00 (4%)
$77.00

List price: $80.00

Instant access, flexible term options, and deep discounts up to 60% on digital content! Happy you, happy us.

Delivered via email within 1 hour
Expires after 365 days
You Save $16.00 (20%)
$64.00
Format: Vitalsource
Use for 365 days

Please note: eTextbooks do not come with access codes, CDs/DVDs, workbooks, and other supplemental items.
Well, that's no good. Unfortunately, this edition is currently out of stock. Please check back soon.

shop us with confidence

Summary

Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Authored by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field.

This edition addresses today's newest trends, from cloud and mobile security to BYOD and the latest compliance requirements. The authors present updated real-life case studies, review questions, and exercises throughout. Coverage includes:

  • The evolving role of IT security, and new opportunities in the field
  • Core information security principles of success
  • Certification programs and the CBK
  • Governance and risk management practices
  • Security architecture and design
  • Business continuity planning
  • Law, investigations, and ethics
  • Physical security
  • Operations security
  • Access control systems and methodology
  • Cryptography
  • Telecommunications, network, and internet security
  • Software development security
  • And much more -- including up-to-date appendices on security policies and standards; sample policies; and H

Digital Rights

eBook Requirements
VitalSource Bookshelf Reader
Minimum System Requirements:
  • Windows 7/8, or Mac OS X 10.6 or above
Software Requirements:

eTextbooks and eChapters can be viewed by using the free reader listed below.

Be sure to check the format of the eTextbook/eChapter you purchase to know which reader you will need. After purchasing your eTextbook or eChapter, you will be emailed instructions on where and how to download your free reader.

Download Requirements:

Due to the size of eTextbooks, a high-speed Internet connection (cable modem, DSL, LAN) is required for download stability and speed. Your connection can be wired or wireless.

Being online is not required for reading an eTextbook after successfully downloading it. You must only be connected to the Internet during the download process.

User Help:

Click Here to access the VitalSource Bookshelf FAQ

Digital Rights
VitalSource
Copying: Allowed, 2 selections may be copied every 365 days
Printing: Allowed, 2 prints for 365 days
Expires: Yes, may be used for 365 days after activation
Reading Aloud: Allowed
Sharing: Not Allowed
Min. Software Version: Online: No additional software required
Offline: VitalSource Bookshelf

Suitable Devices: PCs, Tablet PCs, Macs, Laptops


Digital Rights Management (DRM) Key


Copying - Books that cannot be copied will show "Not Allowed." Otherwise, this will detail the number of times it can be copied, or "Allowed with no limits."

Printing - Books that cannot be printed will show "Not Allowed." Otherwise, this will detail the number of times it can be printed, or "Allowed with no limits."

Expires - Books that have no expiration (the date upon which you will no longer be able to access your eBook) will read "No Expiration." Otherwise it will state the number of days from activation (the first time you actually read it).

Reading Aloud - Books enabled with the "text-to-speech" feature so that they can be read aloud will show "Allowed."

Sharing - Books that cannot be shared with other computers will show "Not Allowed."

Min. Software Version - This is the minimum software version needed to read this book.

Suitable Devices - Hardware known to be compatible with this book. Note: Reader software still needs to be installed.

Other Editions of Information Security: Principles and Practices

Hello, inbox! Get the latest email updates & exclusive deals on cheap textbooks

Hello, inbox! Get the latest email updates & exclusive deals on cheap textbooks

© 2006 - 2018 Textbooks.com All rights reserved