Going beyond the technical coverage of computer and systems security measures, Information Assurance for the Enterprise provides readers an overarching model for information assurance for businesses, government agencies, and other enterprises , Information Assurance for the Enterprise: A Roadmap to Information Security4 out of 5 stars based on 2 reviews
Sold Out
Book Categories |
Ch. 1 | Knowing what to secure | 1 |
Ch. 2 | Assessing risks | 25 |
Ch. 3 | Security policy | 57 |
Ch. 4 | Building and documenting an information assurance framework | 89 |
Ch. 5 | Maintaining security of operations | 113 |
Ch. 6 | Ensuring controlled access | 139 |
Ch. 7 | Personnel security | 175 |
Ch. 8 | Physical security | 205 |
Ch. 9 | Assuring against software vulnerabilities | 231 |
Ch. 10 | Continuity planning and disaster recovery | 257 |
Ch. 11 | Laws, regulations, and crime | 283 |
Ch. 12 | Network security basics : malware and attacks | 311 |
Ch. 13 | Cryptology | 339 |
Ch. 14 | Ensuring the secure use of software | 367 |
Ch. 15 | Human factors : ensuring secure performance | 393 |
Ch. 16 | Information ethics and codes and conduct | 419 |
App. A | Apache longbow AH-64D : target acquisition and display system (TADS) upgrade project | 441 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation Assurance for the Enterprise: A Roadmap to Information Security
X
This Item is in Your InventoryInformation Assurance for the Enterprise: A Roadmap to Information Security
X
You must be logged in to review the productsX
X
X
Add
Information Assurance for the Enterprise: A Roadmap to Information Security,
|