Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Introduction to Information Security: A Strategic-Based Approach

Buy

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.

Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.

  • Provides a broad introduction to the methods and techniques in the field of information security
  • Offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information
  • Provides very current view of the emerging standards of practice in information security
(HTML tags aren't allowed.)

C & Data Structures
C & Data Structures

Divided into three separate sections, C & Data Structures covers C programming, as well as the implementation of data structures and an analysis of advanced data structure problems. Beginning with the basic concepts of the C language (including the operators, control structures, and functions), the book progresses to show these...

Strategic Negotiation : A Breakthrough Four-Step Process for Effective Business Negotiation
Strategic Negotiation : A Breakthrough Four-Step Process for Effective Business Negotiation

We all know that the business environment changes every day. But the radical shift that’s taken place in negotiating in recent years is so substantial that it requires an equally radical shift in thinking. Looking at negotiation as a series of tactics simply won’t work anymore. The only way you can meet the challenges of negotiating...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...


AI for Computer Games and Animation: A Cognitive Modeling Approach
AI for Computer Games and Animation: A Cognitive Modeling Approach
Simply put, AI for Games and Animation: A Cognitive Modeling Approach shows how video game characters can be taught to "think" for themselves. This groundbreaking title points the way for the future of intelligent gaming. While this book features formal mathematical proofs of its arguments, it also provides a worthwhile overview...
Workflow Management: Models, Methods, and Systems (Cooperative Information Systems)
Workflow Management: Models, Methods, and Systems (Cooperative Information Systems)
This book offers a comprehensive introduction to workflow management, the management of business processes with information technology. By defining, analyzing, and redesigning an organization's resources and operations, workflow management systems ensure that the right information reaches the right person or computer application at the right time....
Mastering Data Mining: The Art and Science of Customer Relationship Management
Mastering Data Mining: The Art and Science of Customer Relationship Management
"Berry and Linoff lead the reader down an enlightened path of best practices." -Dr. Jim Goodnight, President and Cofounder, SAS Institute Inc.

"This is a great book, and it will be in my stack of four or five essential resources for my professional work." -Ralph Kimball, Author of The Data Warehouse Lifecycle
...
©2017 LearnIT (support@pdfchm.net) - Privacy Policy