This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the Mc Cumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. Mc Cumber details how information extracted from this resource can be applied to his assessment processes.
¡Compre este libro electrónico y obtenga 1 más GRATIS!
Formato EPUB ● Páginas 288 ● ISBN 9781135488963 ● Editorial CRC Press ● Publicado 2004 ● Descargable 3 veces ● Divisa EUR ● ID 6781327 ● Protección de copia Adobe DRM
Requiere lector de ebook con capacidad DRM