Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Language: English
Published by Taylor & Francis Ltd, London, 2024
ISBN 10: 1032344474 ISBN 13: 9781032344478
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology.The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards.The book:Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparationCovers topics such as managing business assets, agreements on how to deal with business assets, and media handlingDemonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standardsExplains how the organizations assets are managed by asset management, and access control policiesPresents seven case studies The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Language: English
Published by Springer International Publishing AG, Cham, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 45.35
Quantity: Over 20 available
Add to basketCondition: New. In.
Condition: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
Condition: New.
£ 47.47
Quantity: Over 20 available
Add to basketCondition: New. In.
Language: English
Published by Scholars' Press 2020-05, 2020
ISBN 10: 6138929950 ISBN 13: 9786138929956
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
Condition: New.
Language: English
Published by Springer Nature Switzerland AG, Cham, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Paperback. Condition: Brand New. 215 pages. 9.25x6.10x9.25 inches. In Stock.
Condition: New.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 450 pages. 9.26x6.11x9.25 inches. In Stock.
Condition: As New. Unread book in perfect condition.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. First edition Includes bibliographical references and index.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Condition: New. 1st Edition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 60.71
Quantity: Over 20 available
Add to basketCondition: New. In.
Language: English
Published by Taylor & Francis Ltd, 2024
ISBN 10: 1032344474 ISBN 13: 9781032344478
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
£ 60.70
Quantity: Over 20 available
Add to basketPaperback / softback. Condition: New. New copy - Usually dispatched within 4 working days.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Language: English
Published by Taylor & Francis Ltd, London, 2024
ISBN 10: 1032344474 ISBN 13: 9781032344478
Seller: AussieBookSeller, Truganina, VIC, Australia
Paperback. Condition: new. Paperback. The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology.The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards.The book:Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparationCovers topics such as managing business assets, agreements on how to deal with business assets, and media handlingDemonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standardsExplains how the organizations assets are managed by asset management, and access control policiesPresents seven case studies The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Language: English
Published by LAP LAMBERT Academic Publishing, 2020
ISBN 10: 6202563532 ISBN 13: 9786202563536
Seller: moluna, Greven, Germany
Condition: New.
Condition: New.
Condition: New.
Condition: New.