This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private data private, making sure only the people who are authorized have access to the data, making sure your data is always there, always the way you left it, keeping your secrets secret, making sure you trust your sources, and comply with government and industry regulations and standards. It is about managing your risks and keeping the business going when it all goes south. Every new security practitioner should start with this book, which covers the most relevant topics like cloud security, mobile device security and network security and provides a comprehensive overview of what is important in information security. Processes, training strategy, policies, contingency plans, risk management and effectiveness of tools are all extensively discussed.You only have to pay for what you use, and you can do this on your own schedule from whatever handy-dandy ... How. does. the. cloud. work? Imagine how long it would take a computer operator to remove one operating system and installanbsp;...
|Title||:||Essential Information Security|
|Author||:||John Wieland, Cathy Pitt|
|Publisher||:||Van Haren - 2013-08-07|