Information assurance and security 1 & 2 / Marmelo Abante [and eigth others]
Material type:
- 9789719655039
- QA 76.9 .A23 2022
Item type | Current library | Collection | Call number | Materials specified | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|
![]() |
NU Clark Filipiniana | Non-fiction | FIL QA 76.9 .A23 2022 c.1 (Browse shelf(Opens below)) | c.1 | Available | NUCLA000004082 | ||
![]() |
NU Clark Filipiniana | Non-fiction | FIL QA 76.9 .A23 2022 c.2 (Browse shelf(Opens below)) | c.2 | Available | NUCLA000004265 | ||
![]() |
NU Clark Filipiniana | Non-fiction | FIL QA 76.9 .A23 2022 c.3 (Browse shelf(Opens below)) | c.3 | Available | NUCLA000004266 |
Lesson 1: Introduction to information security -- Lesson 2: The demand for security -- Lesson 3: Preparing the system security plan -- Lesson 4: Risk management for security -- Lesson 5: Security technology: firewalls And VPNs -- Lesson 6: Intrusion detection and prevention system -- Lesson 7: Cryptography -- Lesson 8: Physical security -- Lesson 9: Implementing information security -- Lesson 10: Security and personnel -- Lesson 11: Information security maintenance -- Lesson 12: Legal, ethical, and professional issues in information security.
"The goal of this book is to present some of the material that forms the foundation of information assurance and computer security. It was attempted to add instances in order to demonstrate the difficulty of many of the ideas. It is all too simple to assert flatly that a system must have a reference monitor, or that covert channel restrictions must be implemented, or that the network must be secure against unauthorized traffic observation, or any number of other requirements. Typically, such events indicate a severe development issue, as the devil is always found in the details." -- Preface
There are no comments on this title.