Welcome to UE Central Library

Keep Smiling

Fundamentals of information systems security / (Record no. 19487)

MARC details
000 -LEADER
fixed length control field 03265cam a22002777i 4500
001 - CONTROL NUMBER
control field 18653937
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191217144357.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150611t20142014maua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284031621
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1284031624
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284031621 (pbk)
040 ## - CATALOGING SOURCE
Transcribing agency WAU
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number K5601
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kim, David
245 10 - TITLE STATEMENT
Title Fundamentals of information systems security /
Statement of responsibility, etc David Kim and Michael G. Solomon.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington :
Name of publisher, distributor, etc Jones & bartlett,
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 544 p. :
Other physical details illustrations ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement Jones & Bartlett Learning information systems security & assurance series
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information resources
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Solomon, Michael
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part one : The need for information security. Information systems security -- Changing how people and businesses communicate -- Malicious attacks, threats, and vulnerabilities -- The drivers of the information security business -- Part two : The Systems Security Certified Practitioner (SSCP) professional certification from (ISC)2. Access controls -- Security operations and administration -- Auditing, testing, and monitoring -- Risk, response, and recovery -- Cryptography -- Networks and telecommunications -- Malicious code and activity -- Part three : Information security standards, education, certifications, and laws. Information security standards -- Information systems security education and training -- Information security professional certifications -- U.S. compliance laws -- Appendixes. Answer key -- Standard acronyms -- Become a systems security certified practitioner (SSCP) -- Glossary of key terms -- References.
520 ## - SUMMARY, ETC.
Summary, etc Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. New to the Second Edition: New material on cloud computing, risk analysis, IP mobility, OMNIBus, and Agile Software Development; Includes the most recent updates in Information Systems Security laws, certificates, standards, amendments, and the proposed Federal Information Security Amendments Act of 2013 and HITECH Act; Provides new cases and examples pulled from real-world scenarios; Updated data, tables, and sidebars provide the most current information in the field. -
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 17.12.2019 U.E. 005.8 K5601 T12991 17.12.2019 17.12.2019 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk