Information Security Architecture, Second Edition

Course

Distance

£ 53 + VAT

Description

  • Type

    Course

  • Methodology

    Distance Learning

This book describes in detail every one of the eight Information Security Architecture (ISA) components. The book also outlines how to establish an effective plan to implement each piece of the ISA within an organization.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Description
This book describes in detail every one of the eight Information Security Architecture (ISA) components. The book also outlines how to establish an effective plan to implement each piece of the ISA within an organization.

Program

OrderInformation Security Architecture: An Integrated Approach to Security in the OrganizationTodayInformation Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.


In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization.


The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.


Overview of the Book
  • Provides executives with an understanding of the requirements of a strategic security plan
  • Defines laws and regulations related to electronic transmissions, computer crime, intellectual property, information protection, and privacy
  • Reviews the pitfalls and obstacles to effective ISA implementation
  • Addresses security technology including encryption, firewalls, VPNs, passwords, biometrics, honeypots, and more
  • Includes a "Getting Started" section in each chapter to help you build ISA components


Author: Jan Killmeyer
Publisher: Auerbach Publications
ISBN 10: 0849315492
ISBN 13: 9780849315497
Pages: 424
Format: Hard Cover
Published Date: 13/01/2006
Availability: Ex Stock

Information Security Architecture, Second Edition

£ 53 + VAT