CART

(0) items

Information Security Principles and Practices,9780789753250
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Information Security Principles and Practices

by ;
Edition:
2nd
ISBN13:

9780789753250

ISBN10:
0789753251
Format:
Paperback
Pub. Date:
6/4/2014
Publisher(s):
Pearson IT Certification
List Price: $80.00

Rent Textbook

(Recommended)
 
Term
Due
Price
$34.20

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
N9780789753250
$77.00

eTextbook


 
Duration
Price
$36.00

Used Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $82.10
See Prices

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 2nd edition with a publication date of 6/4/2014.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Related Products


  • Information Security : Principles and Practices
    Information Security : Principles and Practices




Summary

Information Security: Principles and Practices, Second Edition

Everything You Need to Know About Modern Computer Security, in One Book

Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK].

Thoroughly updated for today’s challenges, technologies, procedures, and best practices.

The perfect resource for anyone pursuing an IT security career.

 

Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today’s Information Security Common Body of Knowledge.

 

Two highly experienced security practitioners have brought together all the foundational knowledge you need to succeed in today’s IT and business environments. They offer easy-to-understand, practical coverage of topics ranging from security management and physical security to cryptography and application development security.

 

This edition fully addresses new trends that are transforming security, from cloud services to mobile applications, “Bring Your Own Device” (BYOD) strategies to today’s increasingly rigorous compliance requirements. Throughout, you’ll find updated case studies, review questions, and exercises–all designed to reveal today’s real-world IT security challenges and help you overcome them.

 

Learn how to

-- Recognize the evolving role of IT security

-- Identify the best new opportunities in the field

-- Discover today’s core information security principles of success

-- Understand certification programs and the CBK

-- Master today’s best practices for governance and risk management

-- Architect and design systems to maximize security

-- Plan for business continuity

-- Understand the legal, investigatory, and ethical requirements associated with IT security

-- Improve physical and operational security

-- Implement effective access control systems

-- Effectively utilize cryptography

-- Improve network and Internet security

-- Build more secure software

-- Define more effective security policies and standards

-- Preview the future of information security

 

 

Author Biography

Mark Merkow, CISSP, CISM, CSSLP, is a technical director for a Fortune 100 financial services firm, where he works on implementing and operating a software security practice for the enterprise. He has more than 35 years of IT experience, including 20 years in IT security. Mark has worked in a variety of roles, including applications development, systems analysis and design, security engineering, and security management. Mark holds a master’s degree in decision and info systems from Arizona State University (ASU), a master’s of education in Distance Learning from ASU, and a bachelor’s degree in Computer Info Systems from ASU.

 

Jim Breithaupt is a data integrity manager for a major bank, where he manages risk for a large data mart. He has more than 30 years of data processing experience and has co-authored several other books on information systems and information security, along with Mark Merkow.

Table of Contents

Preface
1. Why Study Information Security?
2. Information Security Principles of Success
3. Certification Programs and the Common Body of Knowledge
4. Security Management
5. Security Architecture and Design
6. Business Continuity Planning and Disaster Recovery Planning
7. Law, Investigations, and Ethics
8. Physical Security Control
9. Operations Security
10. Access Control Systems and Methodology
11. Cryptography
12. Telecommunications, Network, and Internet
13. Application Development Security
14. Securing the Future

Appendix A: Common Body of Knowledge
Appendix B: Security Policy and Standards Taxonomy
Appendix C: Sample Policies
Appendix D: Payment Card Industry Data Security Standard (PCI-DSS, Version 2)
Appendix E: Federal Information Security Management Act (FISMA)


Please wait while the item is added to your cart...