Cybersecurity : the essential body of knowledge / Dan Shoemaker, Wm. Arthur Conklin; [edited by] Steve Helba, Marah Bellegarde, Natalie Pashoukos.
Material type:
TextPublication details: Clifton Park, NY : Course Technology, Cengage Learning, 2011.Description: xxiv, 500 p. ; 25 cmISBN: - 9781435481695
- 1435481690
- 005.8 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / SH.C 2011 (Browse shelf(Opens below)) | 1 | Available | 011753 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / PR.I 2005 Information security risk analysis / | 005.8 / RA.M 2006 Microsoft internet security and acceleration (isa) server 2004 administrator’s pocket consultant / | 005.8 / RU.H 2001 Hack Proofing Your e-Commerce Web Site: | 005.8 / SH.C 2011 Cybersecurity : | 005.8 / SI.H 2011 Hands-on ethical hacking and network defense / | 005.8 / SI.H 2011 Hands-on ethical hacking and network defense / | 005.8 / SI.S 2008 Software security technologies : |
Includes index.
1. The Field of Cyber Security -- 2. The DHS EBK Initiative -- 3. Applying the EBK -- 4. The Executive role -- 5. The Functional role -- 6. The Corollary role -- 7. Data Security -- 8. Digital Forensics -- 9. Enterprise Continuity -- 10. Incident Management -- 11. IT Security Training and Awareness -- 12. IT Systems Operations and Maintenance -- 13. Network and Telecommunications Security -- 14. Personnel Security -- 15. Physical and Environmental Security -- 16. Procurement -- 17. Regulatory and Standards Compliance -- 18. Security Risk Management -- 19. Strategic Security Management -- 20. System and Application Security.
CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization.
1
There are no comments on this title.