TY - BOOK AU - Abante, Marmelo AU - Lansingan, Rolando AU - co-author AU - Tomas, Wilfredo Jr. AU - Delos Trinos, Mary Joy AU - Tadeo, Rejan AU - Anuevo, Alain AU - Gongora, Jerald AU - Lacorte, Alice TI - Information assurance and security 1 & 2 SN - 9789719655039 AV - QA 76.9 .A23 2022 PY - 2022/// CY - Intramuros, Manila PB - Mindshapers Co., Inc. KW - COMPUTER SECURITY--CONGRESSES KW - DATA PROTECTION--CONGRESSES KW - COMPUTER NETWORKS--SECURITY MEASURES--CONGRESSES N1 - Lesson 1: Introduction to information security -- Lesson 2: The demand for security -- Lesson 3: Preparing the system security plan -- Lesson 4: Risk management for security -- Lesson 5: Security technology: firewalls And VPNs -- Lesson 6: Intrusion detection and prevention system -- Lesson 7: Cryptography -- Lesson 8: Physical security -- Lesson 9: Implementing information security -- Lesson 10: Security and personnel -- Lesson 11: Information security maintenance -- Lesson 12: Legal, ethical, and professional issues in information security N2 - "The goal of this book is to present some of the material that forms the foundation of information assurance and computer security. It was attempted to add instances in order to demonstrate the difficulty of many of the ideas. It is all too simple to assert flatly that a system must have a reference monitor, or that covert channel restrictions must be implemented, or that the network must be secure against unauthorized traffic observation, or any number of other requirements. Typically, such events indicate a severe development issue, as the devil is always found in the details." -- Preface ER -