This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the Mc Cumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. Mc Cumber details how information extracted from this resource can be applied to his assessment processes.
Beli ebook ini dan dapatkan 1 lagi PERCUMA!
Format EPUB ● Halaman-halaman 288 ● ISBN 9781135488963 ● Penerbit CRC Press ● Diterbitkan 2004 ● Muat turun 3 kali ● Mata wang EUR ● ID 6781327 ● Salin perlindungan Adobe DRM
Memerlukan pembaca ebook yang mampu DRM