Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Introduction to Information Security: A Strategic-Based Approach

Buy

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.

Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.

  • Provides a broad introduction to the methods and techniques in the field of information security
  • Offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information
  • Provides very current view of the emerging standards of practice in information security
(HTML tags aren't allowed.)

Ivor Horton's Beginning Visual C++ 2013
Ivor Horton's Beginning Visual C++ 2013

Learn C++ with the best tutorial on the market!

Horton's unique tutorial approach and step-by-step guidance have helped over 100,000 novice programmers learn C++. In Ivor Horton's Beginning Visual C++ 2013, Horton not only guides you through the fundamentals of the standard C++ language, but also teaches you...

Endometriosis For Dummies
Endometriosis For Dummies

Get the empowering info that puts you in control

Take charge and take comfort in knowing how to live well with endometriosis

Diagnosing and living with endometriosis isn't easy, but this disease doesn't have to rule your life. This book helps you find out and recognize typical symptoms. Plus,
...

Lipid Hydroperoxide-Derived Modification of Biomolecules (Subcellular Biochemistry)
Lipid Hydroperoxide-Derived Modification of Biomolecules (Subcellular Biochemistry)

Lipid peroxidation is an important cellular process which can lead to detrimental effects if it is not regulated efficiently. Lipid hydroperoxide is formed in an initial step of lipid peroxidation. Lipid hydroperoxide is also known as a potential source of singlet oxygen. Harmful aldehydes are formed when the lipid hydroperoxide is degraded....


Maximum Wireless Security
Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
What About Labrador Retrievers: The Joy and Realities of Living with a Lab
What About Labrador Retrievers: The Joy and Realities of Living with a Lab
Are Labrador Retrievers generally healthy dogs?

How much does it cost to keep a Lab?

Can I keep my Lab inside, or do I need a yard?

That little Labrador Retriever puppy is so adorable--but is he the right dog for you? Many prospective dog owners don’t ask the questions they should when deciding to bring a new puppy...

©2017 LearnIT (support@pdfchm.net) - Privacy Policy