Information Technology Security and Risk ManagementWiley, 13 Feb 2006 - 356 halaman IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresses the business implications and requirements of security rather than presenting a technical, programming approach that is generally aligned to studying computer science. This new text address security technology and systems, issues associated with risk minimization and management when implementing security systems, legal and regulatory requirements, basic Cryptography and Public Key Infrastructure, ethics, forensics and fraud, and the intrinsic relationship between business strategy and security systems, such as electronic payment systems, supply chain management and internal/external firewalls. |
Isi
Building blocks of IT security p 39 | 3 |
Chapter | 7 |
IT security context p | 11 |
Hak Cipta | |
41 bagian lainnya tidak diperlihatkan
Istilah dan frasa umum
access control access control matrix algorithm allows applications attack audit AusCERT Australian Computer authentication authorisation Bluetooth breach business processes certificate Chapter cipher text communication Computer Crime computer forensics confidentiality corrective controls cryptography cyber database decryption denial of service devices digital signature e-business e-commerce electronic crime employees encryption ensure example files firewall forensic computing framework guidelines hackers hardware hash identify implemented information resources information security information systems Information Technology Security infrastructure integrity interception internal Internet issues logical security mobile offence operating system organisation packet password payment physical security plaintext potential prevent protection protocol provides public key Public Key Infrastructure RFID Risk Management Security & Risk security and risk security management security policy sender server strategy system security technical threats transaction types virtual private networks viruses web services wireless LAN wireless network
Buku ini dirujuk
Proceedings of the 6th European Conference on Information Warfare & Security ... Dan Remenyi Pratinjau tidak tersedia - 2007 |