Introduction.- Information Systems Security.- Malicious Attacks, Threats, and Vulnerabilities.- Access Controls.- Security Operations and Administration.- Auditing, Testing, and Monitoring.- Risk, Response, and Recovery.- Cryptography.- Networks and Telecommunications Security.- Source Code Security.- Information Security Standards.- Information Systems Security Education and Training.- U.S. Compliance Laws.- Conclusion.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want