This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the Mc Cumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. Mc Cumber details how information extracted from this resource can be applied to his assessment processes.
Acquista questo ebook e ricevine 1 in più GRATIS!
Formato EPUB ● Pagine 288 ● ISBN 9781135488963 ● Casa editrice CRC Press ● Pubblicato 2004 ● Scaricabile 3 volte ● Moneta EUR ● ID 6781327 ● Protezione dalla copia Adobe DRM
Richiede un lettore di ebook compatibile con DRM