A Practical Guide to Security Engineering and Information Assurance
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged s
1101428267
A Practical Guide to Security Engineering and Information Assurance
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged s
77.99 In Stock
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance

by Debra S. Herrmann
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance

by Debra S. Herrmann

eBook

$77.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged s

Product Details

ISBN-13: 9781040170465
Publisher: CRC Press
Publication date: 10/18/2001
Sold by: Barnes & Noble
Format: eBook
Pages: 408
File size: 4 MB

Table of Contents

Introduction. What is Information Assurance, How Does It Relate to Information Security, and Why Are Both Needed? Historical Approaches to Information Security and Information Assurance. Define the System Boundaries. Perform Vulnerability and Threat Analyses. Implement Threat Control Measures. Verify Effectiveness of Threat Control Measures. Conduct Accident/Incident Investigations. Glossary of Terms. Glossary of Techniques. Additional Resources. Summary of the Components, Activities, and Tasks of an Effective Information Security/IA Program. Index.
From the B&N Reads Blog

Customer Reviews