More New and Used
from Private Sellers
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Questions About This Book?
Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 1st edition with a publication date of 11/16/2010.
What is included with this book?
- The Used copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
- The eBook copy of this book is not guaranteed to include any supplemental materials. Typically only the book itself is included.
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!Fundamentals of Information System Security focuses on new risks, threats, and vulnerabilities in a digital world. The integration of the Internet and broadband communications into our everyday lives has created a need for information system security. Furthermore, compliance laws require organizations to protect and secure privacy data and reduce liability. This book will take readers through the fundamentals of information security adapted from the Official (ISC)2 SSCP CBK Study Guide. It reviews the seven domains within the Systems Security Certified Professional certification and concludes with additional resources providing readers with more details on information security system certification, compliance laws, education, and careers.