Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel. Provides a broad introduction to the methods and techniques in the field of information security Offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information Provides very current view of the emerging standards of practice in information security Orlando M. Grutzmacher K. HP/H3C and Huawei Networking Equipment H3C-user SNMP Vulnerability. US-CERT ... Retrieved from alt;http://www.caida.org/ publications/papers/2001/BackScatter/usenixsecurity01.pdfagt;.  Newman D. ... Retrieved from alt;http://dictionary.reference.com/browse/proxyagt;; 2012. Retrievedanbsp;...
|Title||:||Introduction to Information Security|
|Author||:||Timothy Shimeall, Jonathan Spring|
|Publisher||:||Newnes - 2013-11-12|