logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) A practical guide to security engineering and information assurance by Debra S. Herrmann ISBN 9780203972922, 9780849311635, 9781420031492, 0203972929, 0849311632, 142003149X

  • SKU: EBN-1661790
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) A practical guide to security engineering and information assurance after payment.
Authors:Debra S. Herrmann
Pages:410 pages.
Year:2001
Editon:1
Publisher:Auerbach Publications
Language:english
File Size:6.4 MB
Format:pdf
ISBNS:9780203972922, 9780849311635, 9781420031492, 0203972929, 0849311632, 142003149X
Categories: Ebooks

Product desciption

(Ebook) A practical guide to security engineering and information assurance by Debra S. Herrmann ISBN 9780203972922, 9780849311635, 9781420031492, 0203972929, 0849311632, 142003149X

• Examines the impact of both accidental and malicious, intentional action and inaction• Defines the five major components of a comprehensive and effective program• Introduces the concept of IA integrity levels and provides a complete methodology for information security/IA throughout the life of a system• Contains abundant practical how-to information, examples, templates, and discussion problems• Includes a glossary of acronyms and terms and a glossary of 80 techniques• Summarizes the components, activities, and tasks of an effective programToday the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority.A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise.The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system.The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products