Information Security Science Ebook Tooltip Measuring the Vulnerability to Data Compromises

Afbeeldingen

Inkijkexemplaar

Artikel vergelijken

  • Engels
  • E-book
  • 9780128096468
  • 23 juni 2016
  • -42835
Alle productspecificaties
  • Je leest ebooks gemakkelijk op je Kobo e-reader, of op je smartphone of tablet met de bol.com Kobo app. Let op! Ebooks kunnen niet geannuleerd of geretourneerd worden.

Samenvatting

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.

In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.

This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

  • Specifies the analytic and scientific methods necessary to estimate the vulnerability to information loss for a spectrum of threats and attack vectors
  • Represents a unique treatment of the nexus between physical and information security that includes risk analyses of IT device emanations, visible information, audible information, physical information assets, and virtualized IT environments
  • Identifies metrics that point to the root cause of information technology risk and thereby assist security professionals in developing risk management strategies
  • Analyzes numerous threat scenarios and specifies countermeasures based on derived quantitative metrics
  • Provides chapter introductions and end-of-chapter summaries to enhance the reader’s experience and facilitate an appreciation for key concepts

Productspecificaties

Inhoud

Taal
en
Bindwijze
E-book
Oorspronkelijke releasedatum
23 juni 2016
Ebook Formaat
-42835
Illustraties
Nee

Betrokkenen

Hoofdauteur
Carl Young
Tweede Auteur
Carl Young
Co Auteur
Carl Young
Hoofduitgeverij
Syngress

Lees mogelijkheden

Lees dit ebook op
Desktop (Mac en Windows) | Kobo e-reader | Android (smartphone en tablet) | iOS (smartphone en tablet) | Windows (smartphone en tablet)

Overige kenmerken

Studieboek
Nee
Verpakking breedte
191 mm
Verpakking hoogte
235 mm
Verpakking lengte
235 mm
Verpakkingsgewicht
860 g

EAN

EAN
9780128096468

Je vindt dit artikel in

Taal
Engels
Beschikbaarheid
Leverbaar
Boek, ebook of luisterboek?
Ebook
Studieboek of algemeen
Studieboeken
Nog geen reviews

Kies gewenste uitvoering

Prijsinformatie en bestellen

De prijs van dit product is 51 euro. De meest getoonde prijs is 55 euro en 54 cent. Je bespaart 8%.
Je bespaart 8%
Direct beschikbaar
Verkoop door bol
  • E-book is direct beschikbaar na aankoop
  • E-books lezen is voordelig
  • Dag en nacht klantenservice
  • Veilig betalen
Houd er rekening mee dat je downloadartikelen niet kunt annuleren of retourneren. Bij nog niet verschenen producten kun je tot de verschijningsdatum annuleren.
Zie ook de retourvoorwaarden

Lijst met gekozen artikelen om te vergelijken

Vergelijk artikelen