Read more
Klappentext This new text provides students the knowledge and skills they will need to compete for and succeed in the information security roles they will encounter straight out of college. This is accomplished by providing a hands-on immersion in essential system administration, service and application installation and configuration, security tool use, TIG implementation and reporting. It is designed for an introductory course on IS Security offered usually as an elective in IS departments in 2 and 4 year schools. It is not designed for security certification courses. Zusammenfassung * Integrates a unifying theme throughout the book - 'efficiency of network resource utilization' to reinforce strategic organizational purpose of data communication. * Focuses on why technologies have been designed to work the way they do. Inhaltsverzeichnis CHAPTER 1 - INTRODUCTIONCHAPTER 2 - SYSTEM ADMINISTRATION (PART 1)CHAPTER 3 - SYSTEM ADMINISTRATION (PART 2)CHAPTER 4 - THE BASIC INFORMATION SECURITY MODELCHAPTER 5 - ASSET IDENTIFICATION AND CHARACTERIZATIONCHAPTER 6 - THREATS AND VULNERABILITIESCHAPTER 7 - ENCRYPTION CONTROLSCHAPTER 8 - IDENTITY AND ACCESS MANAGEMENTCHAPTER 9 - HARDWARE AND SOFTWARE CONTROLSCHAPTER 10 - SHELL SCRIPTINGCHAPTER 11 - INCIDENT HANDLINGCHAPTER 12 - INCIDENT ANALYSISCHAPTER 13 - POLICIES, STANDARDS, AND GUIDELINESCHAPTER 14 - IT RISK ANALYSIS AND RISK MANAGEMENT
List of contents
CHAPTER 1 - INTRODUCTION
CHAPTER 2 - SYSTEM ADMINISTRATION (PART 1)
CHAPTER 3 - SYSTEM ADMINISTRATION (PART 2)
CHAPTER 4 - THE BASIC INFORMATION SECURITY MODEL
CHAPTER 5 - ASSET IDENTIFICATION AND CHARACTERIZATION
CHAPTER 6 - THREATS AND VULNERABILITIES
CHAPTER 7 - ENCRYPTION CONTROLS
CHAPTER 8 - IDENTITY AND ACCESS MANAGEMENT
CHAPTER 9 - HARDWARE AND SOFTWARE CONTROLS
CHAPTER 10 - SHELL SCRIPTING
CHAPTER 11 - INCIDENT HANDLING
CHAPTER 12 - INCIDENT ANALYSIS
CHAPTER 13 - POLICIES, STANDARDS, AND GUIDELINES
CHAPTER 14 - IT RISK ANALYSIS AND RISK MANAGEMENT