000 04066cam a22004457i 4500
001 18653937
003 OSt
005 20250523144219.0
008 150611t20142014maua b 001 0 eng d
010 _a 2015295678
020 _a9781284220735
020 _a1284031624
035 _a(OCoLC)ocn858876707
040 _aWAU
_beng
_cWAU
_dSCO
_dYDXCP
_dSGB
_dOCLCQ
_dDLC
042 _alccopycat
050 0 0 _aQA76.9.A25
_bK536 2023
082 0 4 _a005.8
_223
100 1 _aKim, David
_c(Information technology security consultant)
245 1 0 _aFundamentals of information systems security /
_cDavid Kim and Michael G. Solomon.
250 _a2nd ed.
264 1 _aBurlington, MA :
_bJones & Bartlett Learning,
_c[2023]
264 4 _c©2023
300 _axxiv, 544 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 1 _aJones & Bartlett Learning information systems security & assurance series
504 _aIncludes bibliographical references (pages 519-522) and index.
505 0 _aPart one : The need for information security. Information systems security -- Changing how people and businesses communicate -- Malicious attacks, threats, and vulnerabilities -- The drivers of the information security business -- Part two : The Systems Security Certified Practitioner (SSCP) professional certification from (ISC)2. Access controls -- Security operations and administration -- Auditing, testing, and monitoring -- Risk, response, and recovery -- Cryptography -- Networks and telecommunications -- Malicious code and activity -- Part three : Information security standards, education, certifications, and laws. Information security standards -- Information systems security education and training -- Information security professional certifications -- U.S. compliance laws -- Appendixes. Answer key -- Standard acronyms -- Become a systems security certified practitioner (SSCP) -- Glossary of key terms -- References.
520 _aRevised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. New to the Second Edition: New material on cloud computing, risk analysis, IP mobility, OMNIBus, and Agile Software Development; Includes the most recent updates in Information Systems Security laws, certificates, standards, amendments, and the proposed Federal Information Security Amendments Act of 2013 and HITECH Act; Provides new cases and examples pulled from real-world scenarios; Updated data, tables, and sidebars provide the most current information in the field. -
_cPublisher.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInformation storage and retrieval systems
_xSecurity measures.
700 1 _aSolomon, Michael
_q(Michael G.),
_d1963-
830 0 _aJones & Bartlett Learning information systems security & assurance series.
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2lcc
_cBK
955 _brl09 2015-11-10 z-processor
_irl09 2015-11-13 ; to BCCD
955 _brl46 2015-06-11 to SMA
999 _c10528
_d10528