Introduction to Information Security

Introduction to Information Security

4.11 - 1251 ratings - Source

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel. Provides a broad introduction to the methods and techniques in the field of information security Offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information Provides very current view of the emerging standards of practice in information security[25] Orlando M. Grutzmacher K. HP/H3C and Huawei Networking Equipment H3C-user SNMP Vulnerability. US-CERT ... Retrieved from alt; publications/papers/2001/BackScatter/usenixsecurity01.pdfagt;. [32] Newman D. ... Retrieved from alt;;; 2012. Retrievedanbsp;...

Title:Introduction to Information Security
Author:Timothy Shimeall, Jonathan Spring
Publisher:Newnes - 2013-11-12


You Must CONTINUE and create a free account to access unlimited downloads & streaming