Information Assurance: Security in the Information Environment (Computer Communications and Networks
2008-11-18 22:49
477 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare, it re-examines why organisations need to take information assurance seriously, and discusses the business, legal, and technical knowledge needed to secure these vital government and business assets. Key topics include: The role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; International standards, policies and security acts. "A refreshingly clear & wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised. http://rapidshare.com/files/8497561/N1846282667.rar
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare, it re-examines why organisations need to take information assurance seriously, and discusses the business, legal, and technical knowledge needed to secure these vital government and business assets. Key topics include: The role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; International standards, policies and security acts. "A refreshingly clear & wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised. http://rapidshare.com/files/8497561/N1846282667.rar
相关文章推荐
- Computer Viruses and Malware (Advances in Information Security)
- Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
- Wireless Network Deployments (The International Series in Engineering and Computer Science)
- 1-Computer Networks and the Internet
- The Information Systems Security Officer's Guide: Establishing and Managing an Information Protectio
- Installing and configuring the Hadoop in the VM environment (1)
- Security and Versioning Models in the Windows Forms Engine Help You Create and Deploy Smart Clients
- Internet Information Services is not installed. You must have Internet Information Services installed in order to use the SharePoint Products and Technologies Configuration Wizard
- The development and prosperous of deep learning theory applying in computer vision(Image part)
- The name or security ID (SID) of the domain specified is inconsistent with the trust information for that domain
- The name or security ID (SID) of the domain specified is inconsistent with the trust information for that domain.
- The name or security ID (SID) of the domain specified is inconsistent with the trust information for that domain(转)
- Improving the Security and User Experience of your Google Sign In Implementation
- Security and Quality of Service in Ad Hoc Wireless Networks
- Paper Notes: On Community Detection in Real-world Networks and the Importance of Degree Assortativit
- Internet Information Services is running in 32-bit emulation mode. Correct the issue listed above and re-run setup.
- The mathematics in computer vision and machine learning
- Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise