Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)(2) CBK]. Thoroughly updated for today's challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career. Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Two highly experienced security practitioners have brought together all the foundational knowledge you need to succeed in today's IT and business environments. They offer easy-to-understand, practical coverage of topics ranging from security management and physical security to cryptography and application development security. This edition fully addresses new trends that are transforming security, from cloud services to mobile applications, "Bring Your Own Device" (BYOD) strategies to today's increasingly rigorous compliance requirements. Throughout, you'll find updated case studies, review questions, and exercises-all designed to reveal today's real-world IT security challenges and help you overcome them. Learn how to -- Recognize the evolving role of IT security -- Identify the best new opportunities in the field -- Discover today's core information security principles of success -- Understand certification programs and the CBK -- Master today's best practices for governance and risk management -- Architect and design systems to maximize security -- Plan for business continuity -- Understand the legal, investigatory, and ethical requirements associated with IT security -- Improve physical and operational security -- Implement effective access control systems -- Effectively utilize cryptography -- Improve network and Internet security -- Build more secure software -- Define more effective security policies and standards -- Preview the future of information security
Les mer
Chapter 1: Why Study Information Security? Chapter 2: Information Security Principles of Success Chapter 3: Certification Programs and the Common Body of Knowledge Chapter 4: Governance and Risk Management Chapter 5: Security Architecture and Design Chapter 6: Business Continuity Planning and Disaster Recovery Planning Chapter 7: Law, Investigations, and Ethics Chapter 8: Physical Security Control Chapter 9: Operations Security Chapter 10: Access Control Systems and Methodology Chapter 11: Cryptography Chapter 12: Telecommunications, Network, and Internet Security Chapter 13: Software Development Security Chapter 14: Securing the Future Appendix A: Common Body of Knowledge Appendix B: Security Policy and Standards Taxonomy Appendix C: Sample Policies Appendix D: HIPAA Security Rule Standards
Les mer

Produktdetaljer

ISBN
9780789753250
Publisert
2014
Utgave
2. utgave
Utgiver
Vendor
Pearson IT Certification
Vekt
640 gr
Høyde
230 mm
Bredde
180 mm
Tykkelse
22 mm
Aldersnivå
06, P
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
368

Om bidragsyterne

Mark Merkow, CISSP, CISM, CSSLP, is a technical director for a Fortune 100 financial services firm, where he works on implementing and operating a software security practice for the enterprise. He has more than 35 years of IT experience, including 20 years in IT security. Mark has worked in a variety of roles, including applications development, systems analysis and design, security engineering, and security management. Mark holds a master's degree in decision and info systems from Arizona State University (ASU), a master's of education in Distance Learning from ASU, and a bachelor's degree in Computer Info Systems from ASU. Jim Breithaupt is a data integrity manager for a major bank, where he manages risk for a large data mart. He has more than 30 years of data processing experience and has co-authored several other books on information systems and information security, along with Mark Merkow.