9781118335895

Information Security and It Risk Management

by ; ;
  • ISBN13:

    9781118335895

  • ISBN10:

    1118335899

  • Format: Paperback
  • Copyright: 4/21/2014
  • Publisher: John Wiley & Sons Inc
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The bShowEBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Agrawal's Information Security and Risk Management, with a technical rather than managerial focus, gives readers the knowledge and skills needed to compete for and succeed in information security roles. The concepts of information security are introduced, but readers are also given the opportunity to learn and practice system administration and other Information Technology skills. Hands-on activities are included throughout as a critical means for readers to learn the material and remain engaged.

Table of Contents

CHAPTER 1 - INTRODUCTION  

CHAPTER 2 - SYSTEM ADMINISTRATION (PART 1)          

CHAPTER 3 - SYSTEM ADMINISTRATION (PART 2)          

CHAPTER 4 - THE BASIC INFORMATION SECURITY MODEL             

CHAPTER 5 - ASSET IDENTIFICATION AND CHARACTERIZATION               

CHAPTER 6 - THREATS AND VULNERABILITIES     

CHAPTER 7 - ENCRYPTION CONTROLS   

CHAPTER 8 - IDENTITY AND ACCESS MANAGEMENT        

CHAPTER 9 - HARDWARE AND SOFTWARE CONTROLS   

CHAPTER 10 - SHELL SCRIPTING               

CHAPTER 11 - INCIDENT HANDLING       

CHAPTER 12 - INCIDENT ANALYSIS          

CHAPTER 13 - POLICIES, STANDARDS, AND GUIDELINES               

CHAPTER 14 - IT RISK ANALYSIS AND RISK MANAGEMENT           

Rewards Program

Write a Review