libcats.org
Главная

A practical guide to security engineering and information assurance

Обложка книги A practical guide to security engineering and information assurance

A practical guide to security engineering and information assurance

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise. The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system. The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.
EPUB | FB2 | MOBI | TXT | RTF
* Конвертация файла может нарушить форматирование оригинала. По-возможности скачивайте файл в оригинальном формате.
Популярные книги за неделю:

50 рецептов для аэрогриля

Автор:
Категория: house, house, cook
Размер книги: 771 Kb

Ключ к сверхсознанию

Автор:
Категория: Путь к себе
Размер книги: 309 Kb

Contemporary Theatre, Film and Television, Volume 97

Автор:
Размер книги: 3.18 Mb
Только что пользователи скачали эти книги:

The Shadow 073 - Crooks Go Straight

Автор:
Размер книги: 235 Kb

Spencer, Wen - 2 Wolf Who Rules

Автор:
Размер книги: 574 Kb

Россия и Италия Сборник

Автор:
Категория: История
Размер книги: 22.58 Mb

Through Our Love

Автор:
Размер книги: 1 Kb

The Bay of Nightingales

Автор:
Категория: fiction
Размер книги: 144 Kb

Mindset The New Psychology of Success

Автор:
Категория: fiction
Размер книги: 383 Kb