Information Security: Principles and Practices, 2nd edition

Published by Pearson IT Certification (May 26, 2014) © 2014

  • Mark S. Merkow
  • Jim Breithaupt
Products list
  • Available for purchase from all major ebook resellers, including InformIT.com
Products list

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com

This product is expected to ship within 3-6 business days for US and 5-10 business days for Canadian customers.

Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Written by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field. This edition addresses today's newest trends, from cloud and mobile security to BYOD and the latest compliance requirements. The authors present updated real-life case studies, review questions, and exercises throughout.

  • Chapter 1: Why Study Information Security?
  • Chapter 2: Information Security Principles of Success
  • Chapter 3: Certification Programs and the Common Body of Knowledge
  • Chapter 4: Governance and Risk Management
  • Chapter 5: Security Architecture and Design
  • Chapter 6: Business Continuity Planning and Disaster Recovery Planning
  • Chapter 7: Law, Investigations, and Ethics
  • Chapter 8: Physical Security Control
  • Chapter 9: Operations Security
  • Chapter 10: Access Control Systems and Methodology
  • Chapter 11: Cryptography
  • Chapter 12: Telecommunications, Network, and Internet Security
  • Chapter 13: Software Development Security
  • Chapter 14: Securing the Future
  • Appendix A: Common Body of Knowledge
  • Appendix B: Security Policy and Standards Taxonomy
  • Appendix C: Sample Policies
  • Appendix D: HIPAA Security Rule Standards

 

Need help? Get in touch