Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Introduction to Information Security: A Strategic-Based Approach

Buy

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.

Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.

  • Provides a broad introduction to the methods and techniques in the field of information security
  • Offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information
  • Provides very current view of the emerging standards of practice in information security
(HTML tags aren't allowed.)

Learning Nagios 4
Learning Nagios 4

Learn how to set up Nagios 4 in order to monitor your systems efficiently About This Book Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a...

Hadoop For Dummies
Hadoop For Dummies

Let Hadoop For Dummies help harness the power of your data and rein in the information overload

Big data has become big business, and companies and organizations of all sizes are struggling to find ways to retrieve valuable information from their massive data sets with becoming overwhelmed. Enter Hadoop and this
...

Creating Development Environments with Vagrant - Second Edition
Creating Development Environments with Vagrant - Second Edition

Leverage the power of Vagrant to create and manage virtual development environments with Puppet, Chef, and VirtualBox

About This Book

  • Get your projects up and running quickly and effortlessly by simulating complicated environments that can be easily shared with colleagues
  • Provision...

A Programmer's Companion to Algorithm Analysis
A Programmer's Companion to Algorithm Analysis
Focusing on practical issues, A Programmer's Companion to Algorithm Analysis bridges the gap between algorithms and software programs. This book explains the fundamental differences between the computational model assumed for algorithms and the real architectures in which programs execute. It highlights the pitfalls that can occur when implementing...
The Book of Odds: From Lightning Strikes to Love at First Sight, the Odds of Everyday Life
The Book of Odds: From Lightning Strikes to Love at First Sight, the Odds of Everyday Life

From the popular Book of Odds website, this stylish and accessible reference book offers a fascinating peek at the probabilities that govern every aspect of human life

Did you know that your odds of dying from drowning are higher than the odds of meeting your mate on a blind date? That the odds a child has seen Internet porn are...

Pro Java 8 Programming
Pro Java 8 Programming

Pro Java 8 Programming covers the core Java development kit. It takes advantage of the finer points of the core standard edition (SE) and development kit version 8. You'll discover the particulars of working with the Java language and APIs to develop applications in many different contexts. You will also delve into more advanced...

©2017 LearnIT (support@pdfchm.net) - Privacy Policy