-
Free Shipping on all Orders Over $35!*
*excludes Marketplace items.
-
We Buy This Book Back!
Downloadable: 30 Days
Downloadable: 60 Days
Downloadable: 90 Days
Downloadable: 180 Days
Downloadable: Lifetime Access
We're Sorry
Sold Out
This item is being sold by an Individual Seller and will not ship from the Online Bookstore's warehouse. The Seller must confirm the order within two business days. If the Seller refuses to sell or fails to confirm within this time frame, then the order is cancelled.
Please be sure to read the Description offered by the Seller.
Table of Contents
ChapterChapter 1 Information Systems Security
ChapterChapter 2 The Internet of Things is Changing How We Live
ChapterChapter 3 Malicious Attacks, Threats, and Vulnerabilities
ChapterChapter 4 The Drivers of the Information Security Business
PartPart 2 Securing Today's Information Systems
ChapterChapter 5 Access controls
ChapterChapter 6 Security Operations and Administration
ChapterChapter 7 Auditing, Testing, and Monitoring
ChapterChapter 8 Risk, Response, and Recovery
ChapterChapter 9 Cryptography
ChapterChapter 10 Networks and Telecommunications
ChapterChapter 11 Malicious Code and Activity
PartPart 3 Information Security Standards, Education, Certifications, and Laws
ChapterChapter 12 Information Security Standards
ChapterChapter 13 Information Systems Security Education and Training
ChapterChapter 14 Information Security Professional Certifications
ChapterChapter 15 U.S. Compliance Laws
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.